Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-12-2024 10:47

General

  • Target

    bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe

  • Size

    79KB

  • MD5

    bd0802393b51f7b88fd1caf18cfb9d59

  • SHA1

    dfca89f012d85280a32517e8541ce219dbc1cf84

  • SHA256

    f42ee437ef9c0ca78a4cead554f84704b79b9092284db57923f5a480c3ac0065

  • SHA512

    3c5ac1a277ace1e98052968f02a8e724327146c6b9c9aab73f6a594b43bc5a40f7200e6e15d69abd43a8b2db932c53ee7df44fd8ba42f7ab73685b93f900bb2d

  • SSDEEP

    1536:GVodbBqHbWtYEmf7OuP6Bm4PERnDq/r/YFRwEdH8N2Ss/2kNSjAnJgzb:GVGNQrEmf7Rh4yYGSK8/sekNSjAJ

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • Disables service(s) 3 TTPs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Modifies firewall policy service 3 TTPs 4 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 1 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
  • Stops running service(s) 4 TTPs
  • Executes dropped EXE 2 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 27 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1192
      • C:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe"
        2⤵
        • Maps connected drives based on registry
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe
          3⤵
          • Event Triggered Execution: Image File Execution Options Injection
          • Impair Defenses: Safe Mode Boot
          • Loads dropped DLL
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2416
          • C:\Windows\SysWOW64\wmipsrt.exe
            "C:\Windows\system32\wmipsrt.exe"
            4⤵
            • Executes dropped EXE
            • Maps connected drives based on registry
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2128
            • C:\Windows\SysWOW64\wmipsrt.exe
              C:\Windows\SysWOW64\wmipsrt.exe
              5⤵
              • Modifies firewall policy service
              • Modifies security service
              • Windows security bypass
              • Drops file in Drivers directory
              • Event Triggered Execution: Image File Execution Options Injection
              • Executes dropped EXE
              • Impair Defenses: Safe Mode Boot
              • Windows security modification
              • Adds Run key to start application
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:2988
              • C:\Windows\SysWOW64\CMD.exe
                CMD /C net stop "avast! Antivirus"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2636
                • C:\Windows\SysWOW64\net.exe
                  net stop "avast! Antivirus"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2620
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "avast! Antivirus"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:476
              • C:\Windows\SysWOW64\CMD.exe
                CMD /C sc stop "avast! Antivirus"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2656
                • C:\Windows\SysWOW64\sc.exe
                  sc stop "avast! Antivirus"
                  7⤵
                  • Launches sc.exe
                  • System Location Discovery: System Language Discovery
                  PID:2180
              • C:\Windows\SysWOW64\CMD.exe
                CMD /C sc config "avast! Antivirus" start= disabled
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:2680
                • C:\Windows\SysWOW64\sc.exe
                  sc config "avast! Antivirus" start= disabled
                  7⤵
                  • Launches sc.exe
                  • System Location Discovery: System Language Discovery
                  PID:1608
              • C:\Windows\SysWOW64\ipconfig.exe
                ipconfig /flushdns
                6⤵
                • System Location Discovery: System Language Discovery
                • Gathers network information
                PID:1040
              • C:\Windows\SysWOW64\CMD.exe
                CMD /C sc delete "avast! Antivirus"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:536
                • C:\Windows\SysWOW64\sc.exe
                  sc delete "avast! Antivirus"
                  7⤵
                  • Launches sc.exe
                  • System Location Discovery: System Language Discovery
                  PID:1716
              • C:\Windows\SysWOW64\CMD.exe
                CMD /C net stop AntiVirService
                6⤵
                • System Location Discovery: System Language Discovery
                PID:1152
                • C:\Windows\SysWOW64\net.exe
                  net stop AntiVirService
                  7⤵
                  • System Location Discovery: System Language Discovery
                  PID:2592
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop AntiVirService
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:1312
              • C:\Windows\SysWOW64\CMD.exe
                CMD /C sc stop AntiVirService
                6⤵
                  PID:1164
                  • C:\Windows\SysWOW64\sc.exe
                    sc stop AntiVirService
                    7⤵
                    • Launches sc.exe
                    PID:2012
                • C:\Windows\SysWOW64\CMD.exe
                  CMD /C sc config AntiVirService start= disabled
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:1512
                  • C:\Windows\SysWOW64\sc.exe
                    sc config AntiVirService start= disabled
                    7⤵
                    • Launches sc.exe
                    • System Location Discovery: System Language Discovery
                    PID:2664
                • C:\Windows\SysWOW64\CMD.exe
                  CMD /C sc delete AntiVirService
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:2572
                  • C:\Windows\SysWOW64\sc.exe
                    sc delete AntiVirService
                    7⤵
                    • Launches sc.exe
                    • System Location Discovery: System Language Discovery
                    PID:316
                • C:\Windows\SysWOW64\CMD.exe
                  CMD /C net stop PASRV
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:1748
                  • C:\Windows\SysWOW64\net.exe
                    net stop PASRV
                    7⤵
                      PID:2932
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop PASRV
                        8⤵
                        • System Location Discovery: System Language Discovery
                        PID:2060
                  • C:\Windows\SysWOW64\CMD.exe
                    CMD /C sc stop PASRV
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:1668
                    • C:\Windows\SysWOW64\sc.exe
                      sc stop PASRV
                      7⤵
                      • Launches sc.exe
                      • System Location Discovery: System Language Discovery
                      PID:2492
                  • C:\Windows\SysWOW64\CMD.exe
                    CMD /C sc config PASRV start= disabled
                    6⤵
                    • System Location Discovery: System Language Discovery
                    PID:1688
                    • C:\Windows\SysWOW64\sc.exe
                      sc config PASRV start= disabled
                      7⤵
                      • Launches sc.exe
                      • System Location Discovery: System Language Discovery
                      PID:568
                  • C:\Windows\SysWOW64\CMD.exe
                    CMD /C sc delete PASRV
                    6⤵
                      PID:2024
                      • C:\Windows\SysWOW64\sc.exe
                        sc delete PASRV
                        7⤵
                        • Launches sc.exe
                        PID:2396
                    • C:\Windows\SysWOW64\CMD.exe
                      CMD /C net stop VSSERV
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:2356
                      • C:\Windows\SysWOW64\net.exe
                        net stop VSSERV
                        7⤵
                        • System Location Discovery: System Language Discovery
                        PID:1020
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop VSSERV
                          8⤵
                          • System Location Discovery: System Language Discovery
                          PID:448
                    • C:\Windows\SysWOW64\CMD.exe
                      CMD /C sc stop VSSERV
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:1800
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop VSSERV
                        7⤵
                        • Launches sc.exe
                        PID:3044
                    • C:\Windows\SysWOW64\CMD.exe
                      CMD /C sc config VSSERV start= disabled
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:2264
                      • C:\Windows\SysWOW64\sc.exe
                        sc config VSSERV start= disabled
                        7⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:1348
                    • C:\Windows\SysWOW64\CMD.exe
                      CMD /C sc delete VSSERV
                      6⤵
                        PID:2588
                        • C:\Windows\SysWOW64\sc.exe
                          sc delete VSSERV
                          7⤵
                          • Launches sc.exe
                          PID:1532
                      • C:\Windows\SysWOW64\CMD.exe
                        CMD /C net stop avg8wd
                        6⤵
                        • System Location Discovery: System Language Discovery
                        PID:2008
                        • C:\Windows\SysWOW64\net.exe
                          net stop avg8wd
                          7⤵
                          • System Location Discovery: System Language Discovery
                          PID:1828
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop avg8wd
                            8⤵
                              PID:2576
                        • C:\Windows\SysWOW64\CMD.exe
                          CMD /C sc stop avg8wd
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:1360
                          • C:\Windows\SysWOW64\sc.exe
                            sc stop avg8wd
                            7⤵
                            • Launches sc.exe
                            • System Location Discovery: System Language Discovery
                            PID:1064
                        • C:\Windows\SysWOW64\CMD.exe
                          CMD /C sc config avg8wd start= disabled
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:1596
                          • C:\Windows\SysWOW64\sc.exe
                            sc config avg8wd start= disabled
                            7⤵
                            • Launches sc.exe
                            • System Location Discovery: System Language Discovery
                            PID:916
                        • C:\Windows\SysWOW64\CMD.exe
                          CMD /C sc delete avg8wd
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:2800
                          • C:\Windows\SysWOW64\sc.exe
                            sc delete avg8wd
                            7⤵
                            • Launches sc.exe
                            • System Location Discovery: System Language Discovery
                            PID:2288
                        • C:\Windows\SysWOW64\CMD.exe
                          CMD /C net stop NOD32krn
                          6⤵
                          • System Location Discovery: System Language Discovery
                          PID:1784
                          • C:\Windows\SysWOW64\net.exe
                            net stop NOD32krn
                            7⤵
                            • System Location Discovery: System Language Discovery
                            PID:2548
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop NOD32krn
                              8⤵
                                PID:2184
                          • C:\Windows\SysWOW64\CMD.exe
                            CMD /C sc stop NOD32krn
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:908
                            • C:\Windows\SysWOW64\sc.exe
                              sc stop NOD32krn
                              7⤵
                              • Launches sc.exe
                              PID:2252
                          • C:\Windows\SysWOW64\CMD.exe
                            CMD /C sc config NOD32krn start= disabled
                            6⤵
                              PID:924
                              • C:\Windows\SysWOW64\sc.exe
                                sc config NOD32krn start= disabled
                                7⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:2292
                            • C:\Windows\SysWOW64\CMD.exe
                              CMD /C sc delete NOD32krn
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:1936
                              • C:\Windows\SysWOW64\sc.exe
                                sc delete NOD32krn
                                7⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:1700
                            • C:\Windows\SysWOW64\CMD.exe
                              CMD /C net stop SbPF.Launcher
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:1832
                              • C:\Windows\SysWOW64\net.exe
                                net stop SbPF.Launcher
                                7⤵
                                • System Location Discovery: System Language Discovery
                                PID:1068
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 stop SbPF.Launcher
                                  8⤵
                                    PID:2340
                              • C:\Windows\SysWOW64\CMD.exe
                                CMD /C sc stop SbPF.Launcher
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:2440
                                • C:\Windows\SysWOW64\sc.exe
                                  sc stop SbPF.Launcher
                                  7⤵
                                  • Launches sc.exe
                                  • System Location Discovery: System Language Discovery
                                  PID:1980
                              • C:\Windows\SysWOW64\CMD.exe
                                CMD /C sc config SbPF.Launcher start= disabled
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:1792
                                • C:\Windows\SysWOW64\sc.exe
                                  sc config SbPF.Launcher start= disabled
                                  7⤵
                                  • Launches sc.exe
                                  PID:1752
                              • C:\Windows\SysWOW64\CMD.exe
                                CMD /C sc delete SbPF.Launcher
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:2404
                                • C:\Windows\SysWOW64\sc.exe
                                  sc delete SbPF.Launcher
                                  7⤵
                                  • Launches sc.exe
                                  PID:1584
                              • C:\Windows\SysWOW64\CMD.exe
                                CMD /C net stop SPF4
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:1692
                                • C:\Windows\SysWOW64\net.exe
                                  net stop SPF4
                                  7⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2120
                                  • C:\Windows\SysWOW64\net1.exe
                                    C:\Windows\system32\net1 stop SPF4
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2696
                              • C:\Windows\SysWOW64\CMD.exe
                                CMD /C sc stop SPF4
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:2160
                                • C:\Windows\SysWOW64\sc.exe
                                  sc stop SPF4
                                  7⤵
                                  • Launches sc.exe
                                  • System Location Discovery: System Language Discovery
                                  PID:848
                              • C:\Windows\SysWOW64\CMD.exe
                                CMD /C sc config SPF4 start= disabled
                                6⤵
                                  PID:2388
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc config SPF4 start= disabled
                                    7⤵
                                    • Launches sc.exe
                                    PID:1284
                                • C:\Windows\SysWOW64\CMD.exe
                                  CMD /C sc delete SPF4
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1648
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc delete SPF4
                                    7⤵
                                    • Launches sc.exe
                                    PID:3036
                                • C:\Windows\SysWOW64\CMD.exe
                                  CMD /C net stop acssrv
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2256
                                  • C:\Windows\SysWOW64\net.exe
                                    net stop acssrv
                                    7⤵
                                      PID:2260
                                      • C:\Windows\SysWOW64\net1.exe
                                        C:\Windows\system32\net1 stop acssrv
                                        8⤵
                                          PID:888
                                    • C:\Windows\SysWOW64\CMD.exe
                                      CMD /C sc stop acssrv
                                      6⤵
                                        PID:2748
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc stop acssrv
                                          7⤵
                                          • Launches sc.exe
                                          • System Location Discovery: System Language Discovery
                                          PID:2720
                                      • C:\Windows\SysWOW64\CMD.exe
                                        CMD /C sc config acssrv start= disabled
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2832
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc config acssrv start= disabled
                                          7⤵
                                          • Launches sc.exe
                                          • System Location Discovery: System Language Discovery
                                          PID:2756
                                      • C:\Windows\SysWOW64\CMD.exe
                                        CMD /C sc delete acssrv
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2768
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc delete acssrv
                                          7⤵
                                          • Launches sc.exe
                                          • System Location Discovery: System Language Discovery
                                          PID:2628
                                      • C:\Windows\SysWOW64\ipconfig.exe
                                        ipconfig /flushdns
                                        6⤵
                                        • Gathers network information
                                        PID:2604
                                      • C:\Windows\SysWOW64\ipconfig.exe
                                        ipconfig /flushdns
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        • Gathers network information
                                        PID:2940
                                  • C:\Windows\SysWOW64\CMD.exe
                                    CMD /C del /F /S /Q *.zip
                                    4⤵
                                      PID:2328
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BD0802~1.EXE > nul
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2748

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • C:\Windows\System32\drivers\etc\hosts

                                Filesize

                                15KB

                                MD5

                                96d179abc939ae4cc8f6d61cb8b6fe6d

                                SHA1

                                004f2c2f14a8d1bf66a0bf3d3e71e23b68dd5b7a

                                SHA256

                                aa2d65cfa18eac8f7f1a22ddc6b06eed4b5b6acf4de8313a3847d4c036295194

                                SHA512

                                434c54224c43710e44f700f76fcb4935216daac882cdab72d1e078e5b86f1f99342ad6d2b6aefa645277aa2fb7b06ee9c1c2f1d82b833b8517c1d5427dc78719

                              • \Windows\SysWOW64\wmipsrt.exe

                                Filesize

                                79KB

                                MD5

                                bd0802393b51f7b88fd1caf18cfb9d59

                                SHA1

                                dfca89f012d85280a32517e8541ce219dbc1cf84

                                SHA256

                                f42ee437ef9c0ca78a4cead554f84704b79b9092284db57923f5a480c3ac0065

                                SHA512

                                3c5ac1a277ace1e98052968f02a8e724327146c6b9c9aab73f6a594b43bc5a40f7200e6e15d69abd43a8b2db932c53ee7df44fd8ba42f7ab73685b93f900bb2d

                              • memory/1192-31-0x0000000002560000-0x0000000002561000-memory.dmp

                                Filesize

                                4KB

                              • memory/1192-32-0x0000000002570000-0x000000000257E000-memory.dmp

                                Filesize

                                56KB

                              • memory/1984-0-0x0000000000400000-0x000000000041C000-memory.dmp

                                Filesize

                                112KB

                              • memory/1984-5-0x0000000000400000-0x000000000041C000-memory.dmp

                                Filesize

                                112KB

                              • memory/2416-8-0x0000000001000000-0x0000000001074000-memory.dmp

                                Filesize

                                464KB

                              • memory/2416-7-0x0000000001000000-0x0000000001074000-memory.dmp

                                Filesize

                                464KB

                              • memory/2416-19-0x0000000000A00000-0x0000000000A1C000-memory.dmp

                                Filesize

                                112KB

                              • memory/2416-18-0x0000000000A00000-0x0000000000A1C000-memory.dmp

                                Filesize

                                112KB

                              • memory/2416-21-0x0000000001000000-0x0000000001074000-memory.dmp

                                Filesize

                                464KB

                              • memory/2416-2-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                Filesize

                                4KB

                              • memory/2416-4-0x0000000001000000-0x0000000001074000-memory.dmp

                                Filesize

                                464KB

                              • memory/2416-1-0x0000000001000000-0x0000000001074000-memory.dmp

                                Filesize

                                464KB

                              • memory/2988-30-0x0000000001000000-0x0000000001074000-memory.dmp

                                Filesize

                                464KB