Analysis
-
max time kernel
138s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 18:58
Static task
static1
Behavioral task
behavioral1
Sample
b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe
-
Size
284KB
-
MD5
b9b0866f62ca8e63dfa1c25d8a3d1c0a
-
SHA1
e82c3c9cf73945f5355a4b13e5e0cd1809f029dd
-
SHA256
5717e8fdbb3584378709d5d3902f5340fc25f305f4d5e72a47585395879b3510
-
SHA512
1f2f739c9a32749fbb7ac67f8ad15dcb4e8b9f69a63aec92a936ba93636583531bd284eb892b7387897888b6ee5e4849082d3aff964071533283f07bc01040bb
-
SSDEEP
6144:AVdXhw8TAcCHKg77t139iriX6djwucCTWO:AVdX6DcqPt13Ci1ucUv
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 6 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxtk32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation igfxtk32.exe -
Deletes itself 1 IoCs
pid Process 2484 igfxtk32.exe -
Executes dropped EXE 11 IoCs
pid Process 220 igfxtk32.exe 2484 igfxtk32.exe 1156 igfxtk32.exe 388 igfxtk32.exe 1504 igfxtk32.exe 640 igfxtk32.exe 4368 igfxtk32.exe 2104 igfxtk32.exe 2080 igfxtk32.exe 4552 igfxtk32.exe 1128 igfxtk32.exe -
Maps connected drives based on registry 3 TTPs 12 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtk32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxtk32.exe -
Drops file in System32 directory 18 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\igfxtk32.exe igfxtk32.exe File opened for modification C:\Windows\SysWOW64\ igfxtk32.exe File opened for modification C:\Windows\SysWOW64\igfxtk32.exe igfxtk32.exe File created C:\Windows\SysWOW64\igfxtk32.exe igfxtk32.exe File opened for modification C:\Windows\SysWOW64\ b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxtk32.exe b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxtk32.exe File created C:\Windows\SysWOW64\igfxtk32.exe igfxtk32.exe File opened for modification C:\Windows\SysWOW64\igfxtk32.exe igfxtk32.exe File opened for modification C:\Windows\SysWOW64\ igfxtk32.exe File opened for modification C:\Windows\SysWOW64\ igfxtk32.exe File created C:\Windows\SysWOW64\igfxtk32.exe igfxtk32.exe File created C:\Windows\SysWOW64\igfxtk32.exe b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxtk32.exe igfxtk32.exe File opened for modification C:\Windows\SysWOW64\igfxtk32.exe igfxtk32.exe File opened for modification C:\Windows\SysWOW64\ igfxtk32.exe File opened for modification C:\Windows\SysWOW64\igfxtk32.exe igfxtk32.exe File created C:\Windows\SysWOW64\igfxtk32.exe igfxtk32.exe -
Suspicious use of SetThreadContext 6 IoCs
description pid Process procid_target PID 3996 set thread context of 1432 3996 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 89 PID 220 set thread context of 2484 220 igfxtk32.exe 93 PID 1156 set thread context of 388 1156 igfxtk32.exe 95 PID 1504 set thread context of 640 1504 igfxtk32.exe 97 PID 4368 set thread context of 2104 4368 igfxtk32.exe 99 PID 2080 set thread context of 4552 2080 igfxtk32.exe 101 -
resource yara_rule behavioral2/memory/1432-0-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1432-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1432-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1432-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1432-38-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2484-44-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2484-46-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/388-54-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/388-58-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/640-67-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/2104-73-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4552-80-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtk32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxtk32.exe -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtk32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ igfxtk32.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 1432 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 1432 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 1432 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 1432 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 2484 igfxtk32.exe 2484 igfxtk32.exe 2484 igfxtk32.exe 2484 igfxtk32.exe 388 igfxtk32.exe 388 igfxtk32.exe 388 igfxtk32.exe 388 igfxtk32.exe 640 igfxtk32.exe 640 igfxtk32.exe 640 igfxtk32.exe 640 igfxtk32.exe 2104 igfxtk32.exe 2104 igfxtk32.exe 2104 igfxtk32.exe 2104 igfxtk32.exe 4552 igfxtk32.exe 4552 igfxtk32.exe 4552 igfxtk32.exe 4552 igfxtk32.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 3996 wrote to memory of 1432 3996 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 89 PID 3996 wrote to memory of 1432 3996 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 89 PID 3996 wrote to memory of 1432 3996 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 89 PID 3996 wrote to memory of 1432 3996 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 89 PID 3996 wrote to memory of 1432 3996 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 89 PID 3996 wrote to memory of 1432 3996 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 89 PID 3996 wrote to memory of 1432 3996 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 89 PID 1432 wrote to memory of 220 1432 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 90 PID 1432 wrote to memory of 220 1432 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 90 PID 1432 wrote to memory of 220 1432 b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe 90 PID 220 wrote to memory of 2484 220 igfxtk32.exe 93 PID 220 wrote to memory of 2484 220 igfxtk32.exe 93 PID 220 wrote to memory of 2484 220 igfxtk32.exe 93 PID 220 wrote to memory of 2484 220 igfxtk32.exe 93 PID 220 wrote to memory of 2484 220 igfxtk32.exe 93 PID 220 wrote to memory of 2484 220 igfxtk32.exe 93 PID 220 wrote to memory of 2484 220 igfxtk32.exe 93 PID 2484 wrote to memory of 1156 2484 igfxtk32.exe 94 PID 2484 wrote to memory of 1156 2484 igfxtk32.exe 94 PID 2484 wrote to memory of 1156 2484 igfxtk32.exe 94 PID 1156 wrote to memory of 388 1156 igfxtk32.exe 95 PID 1156 wrote to memory of 388 1156 igfxtk32.exe 95 PID 1156 wrote to memory of 388 1156 igfxtk32.exe 95 PID 1156 wrote to memory of 388 1156 igfxtk32.exe 95 PID 1156 wrote to memory of 388 1156 igfxtk32.exe 95 PID 1156 wrote to memory of 388 1156 igfxtk32.exe 95 PID 1156 wrote to memory of 388 1156 igfxtk32.exe 95 PID 388 wrote to memory of 1504 388 igfxtk32.exe 96 PID 388 wrote to memory of 1504 388 igfxtk32.exe 96 PID 388 wrote to memory of 1504 388 igfxtk32.exe 96 PID 1504 wrote to memory of 640 1504 igfxtk32.exe 97 PID 1504 wrote to memory of 640 1504 igfxtk32.exe 97 PID 1504 wrote to memory of 640 1504 igfxtk32.exe 97 PID 1504 wrote to memory of 640 1504 igfxtk32.exe 97 PID 1504 wrote to memory of 640 1504 igfxtk32.exe 97 PID 1504 wrote to memory of 640 1504 igfxtk32.exe 97 PID 1504 wrote to memory of 640 1504 igfxtk32.exe 97 PID 640 wrote to memory of 4368 640 igfxtk32.exe 98 PID 640 wrote to memory of 4368 640 igfxtk32.exe 98 PID 640 wrote to memory of 4368 640 igfxtk32.exe 98 PID 4368 wrote to memory of 2104 4368 igfxtk32.exe 99 PID 4368 wrote to memory of 2104 4368 igfxtk32.exe 99 PID 4368 wrote to memory of 2104 4368 igfxtk32.exe 99 PID 4368 wrote to memory of 2104 4368 igfxtk32.exe 99 PID 4368 wrote to memory of 2104 4368 igfxtk32.exe 99 PID 4368 wrote to memory of 2104 4368 igfxtk32.exe 99 PID 4368 wrote to memory of 2104 4368 igfxtk32.exe 99 PID 2104 wrote to memory of 2080 2104 igfxtk32.exe 100 PID 2104 wrote to memory of 2080 2104 igfxtk32.exe 100 PID 2104 wrote to memory of 2080 2104 igfxtk32.exe 100 PID 2080 wrote to memory of 4552 2080 igfxtk32.exe 101 PID 2080 wrote to memory of 4552 2080 igfxtk32.exe 101 PID 2080 wrote to memory of 4552 2080 igfxtk32.exe 101 PID 2080 wrote to memory of 4552 2080 igfxtk32.exe 101 PID 2080 wrote to memory of 4552 2080 igfxtk32.exe 101 PID 2080 wrote to memory of 4552 2080 igfxtk32.exe 101 PID 2080 wrote to memory of 4552 2080 igfxtk32.exe 101 PID 4552 wrote to memory of 1128 4552 igfxtk32.exe 102 PID 4552 wrote to memory of 1128 4552 igfxtk32.exe 102 PID 4552 wrote to memory of 1128 4552 igfxtk32.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b9b0866f62ca8e63dfa1c25d8a3d1c0a_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\igfxtk32.exe"C:\Windows\system32\igfxtk32.exe" C:\Users\Admin\AppData\Local\Temp\B9B086~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\igfxtk32.exe"C:\Windows\system32\igfxtk32.exe" C:\Users\Admin\AppData\Local\Temp\B9B086~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\igfxtk32.exe"C:\Windows\system32\igfxtk32.exe" C:\Windows\SysWOW64\igfxtk32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\igfxtk32.exe"C:\Windows\system32\igfxtk32.exe" C:\Windows\SysWOW64\igfxtk32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\igfxtk32.exe"C:\Windows\system32\igfxtk32.exe" C:\Windows\SysWOW64\igfxtk32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\igfxtk32.exe"C:\Windows\system32\igfxtk32.exe" C:\Windows\SysWOW64\igfxtk32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\igfxtk32.exe"C:\Windows\system32\igfxtk32.exe" C:\Windows\SysWOW64\igfxtk32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\igfxtk32.exe"C:\Windows\system32\igfxtk32.exe" C:\Windows\SysWOW64\igfxtk32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\igfxtk32.exe"C:\Windows\system32\igfxtk32.exe" C:\Windows\SysWOW64\igfxtk32.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\igfxtk32.exe"C:\Windows\system32\igfxtk32.exe" C:\Windows\SysWOW64\igfxtk32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\igfxtk32.exe"C:\Windows\system32\igfxtk32.exe" C:\Windows\SysWOW64\igfxtk32.exe13⤵
- Executes dropped EXE
PID:1128
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD5b9b0866f62ca8e63dfa1c25d8a3d1c0a
SHA1e82c3c9cf73945f5355a4b13e5e0cd1809f029dd
SHA2565717e8fdbb3584378709d5d3902f5340fc25f305f4d5e72a47585395879b3510
SHA5121f2f739c9a32749fbb7ac67f8ad15dcb4e8b9f69a63aec92a936ba93636583531bd284eb892b7387897888b6ee5e4849082d3aff964071533283f07bc01040bb