Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-12-2024 10:47

General

  • Target

    bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe

  • Size

    79KB

  • MD5

    bd0802393b51f7b88fd1caf18cfb9d59

  • SHA1

    dfca89f012d85280a32517e8541ce219dbc1cf84

  • SHA256

    f42ee437ef9c0ca78a4cead554f84704b79b9092284db57923f5a480c3ac0065

  • SHA512

    3c5ac1a277ace1e98052968f02a8e724327146c6b9c9aab73f6a594b43bc5a40f7200e6e15d69abd43a8b2db932c53ee7df44fd8ba42f7ab73685b93f900bb2d

  • SSDEEP

    1536:GVodbBqHbWtYEmf7OuP6Bm4PERnDq/r/YFRwEdH8N2Ss/2kNSjAnJgzb:GVGNQrEmf7Rh4yYGSK8/sekNSjAJ

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • Disables service(s) 3 TTPs
  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Modifies firewall policy service 3 TTPs 8 IoCs
  • Modifies security service 2 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Disables use of System Restore points 1 TTPs
  • Drops file in Drivers directory 1 IoCs
  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 4 IoCs
  • Stops running service(s) 4 TTPs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Impair Defenses: Safe Mode Boot 1 TTPs 2 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Maps connected drives based on registry 3 TTPs 4 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 4 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Launches sc.exe 27 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 3 IoCs

    Uses commandline utility to view network configuration.

  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3484
      • C:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe
        "C:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe"
        2⤵
        • Maps connected drives based on registry
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe
          C:\Users\Admin\AppData\Local\Temp\bd0802393b51f7b88fd1caf18cfb9d59_JaffaCakes118.exe
          3⤵
          • Event Triggered Execution: Image File Execution Options Injection
          • Checks computer location settings
          • Impair Defenses: Safe Mode Boot
          • Adds Run key to start application
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3120
          • C:\Windows\SysWOW64\wmipsrt.exe
            "C:\Windows\system32\wmipsrt.exe"
            4⤵
            • Executes dropped EXE
            • Maps connected drives based on registry
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:5032
            • C:\Windows\SysWOW64\wmipsrt.exe
              C:\Windows\SysWOW64\wmipsrt.exe
              5⤵
              • Modifies firewall policy service
              • Modifies security service
              • Windows security bypass
              • Drops file in Drivers directory
              • Event Triggered Execution: Image File Execution Options Injection
              • Executes dropped EXE
              • Impair Defenses: Safe Mode Boot
              • Windows security modification
              • Adds Run key to start application
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of FindShellTrayWindow
              • Suspicious use of WriteProcessMemory
              PID:3728
              • C:\Windows\SysWOW64\CMD.exe
                CMD /C net stop "avast! Antivirus"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3864
                • C:\Windows\SysWOW64\net.exe
                  net stop "avast! Antivirus"
                  7⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2320
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 stop "avast! Antivirus"
                    8⤵
                    • System Location Discovery: System Language Discovery
                    PID:4292
              • C:\Windows\SysWOW64\CMD.exe
                CMD /C sc stop "avast! Antivirus"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:2520
                • C:\Windows\SysWOW64\sc.exe
                  sc stop "avast! Antivirus"
                  7⤵
                  • Launches sc.exe
                  • System Location Discovery: System Language Discovery
                  PID:3464
              • C:\Windows\SysWOW64\CMD.exe
                CMD /C sc config "avast! Antivirus" start= disabled
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3244
                • C:\Windows\SysWOW64\sc.exe
                  sc config "avast! Antivirus" start= disabled
                  7⤵
                  • Launches sc.exe
                  • System Location Discovery: System Language Discovery
                  PID:724
              • C:\Windows\SysWOW64\ipconfig.exe
                ipconfig /flushdns
                6⤵
                • Gathers network information
                PID:2660
              • C:\Windows\SysWOW64\CMD.exe
                CMD /C sc delete "avast! Antivirus"
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:4852
                • C:\Windows\SysWOW64\sc.exe
                  sc delete "avast! Antivirus"
                  7⤵
                  • Launches sc.exe
                  PID:544
              • C:\Windows\SysWOW64\CMD.exe
                CMD /C net stop AntiVirService
                6⤵
                • System Location Discovery: System Language Discovery
                • Suspicious use of WriteProcessMemory
                PID:3968
                • C:\Windows\SysWOW64\net.exe
                  net stop AntiVirService
                  7⤵
                    PID:4484
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop AntiVirService
                      8⤵
                      • System Location Discovery: System Language Discovery
                      PID:2012
                • C:\Windows\SysWOW64\CMD.exe
                  CMD /C sc stop AntiVirService
                  6⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:4020
                  • C:\Windows\SysWOW64\sc.exe
                    sc stop AntiVirService
                    7⤵
                    • Launches sc.exe
                    PID:4960
                • C:\Windows\SysWOW64\CMD.exe
                  CMD /C sc config AntiVirService start= disabled
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:4120
                  • C:\Windows\SysWOW64\sc.exe
                    sc config AntiVirService start= disabled
                    7⤵
                    • Launches sc.exe
                    • System Location Discovery: System Language Discovery
                    PID:1804
                • C:\Windows\SysWOW64\CMD.exe
                  CMD /C sc delete AntiVirService
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:4116
                  • C:\Windows\SysWOW64\sc.exe
                    sc delete AntiVirService
                    7⤵
                    • Launches sc.exe
                    • System Location Discovery: System Language Discovery
                    PID:3600
                • C:\Windows\SysWOW64\CMD.exe
                  CMD /C net stop PASRV
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:3288
                  • C:\Windows\SysWOW64\net.exe
                    net stop PASRV
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:5052
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop PASRV
                      8⤵
                        PID:3704
                  • C:\Windows\SysWOW64\CMD.exe
                    CMD /C sc stop PASRV
                    6⤵
                      PID:1372
                      • C:\Windows\SysWOW64\sc.exe
                        sc stop PASRV
                        7⤵
                        • Launches sc.exe
                        PID:3120
                    • C:\Windows\SysWOW64\CMD.exe
                      CMD /C sc config PASRV start= disabled
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:3532
                      • C:\Windows\SysWOW64\sc.exe
                        sc config PASRV start= disabled
                        7⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:3536
                    • C:\Windows\SysWOW64\CMD.exe
                      CMD /C sc delete PASRV
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:4860
                      • C:\Windows\SysWOW64\sc.exe
                        sc delete PASRV
                        7⤵
                        • Launches sc.exe
                        • System Location Discovery: System Language Discovery
                        PID:1504
                    • C:\Windows\SysWOW64\CMD.exe
                      CMD /C net stop VSSERV
                      6⤵
                      • System Location Discovery: System Language Discovery
                      PID:5100
                      • C:\Windows\SysWOW64\net.exe
                        net stop VSSERV
                        7⤵
                        • System Location Discovery: System Language Discovery
                        PID:1128
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop VSSERV
                          8⤵
                            PID:4904
                      • C:\Windows\SysWOW64\CMD.exe
                        CMD /C sc stop VSSERV
                        6⤵
                          PID:3172
                          • C:\Windows\SysWOW64\sc.exe
                            sc stop VSSERV
                            7⤵
                            • Launches sc.exe
                            • System Location Discovery: System Language Discovery
                            PID:32
                        • C:\Windows\SysWOW64\CMD.exe
                          CMD /C sc config VSSERV start= disabled
                          6⤵
                            PID:1604
                            • C:\Windows\SysWOW64\sc.exe
                              sc config VSSERV start= disabled
                              7⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:4692
                          • C:\Windows\SysWOW64\CMD.exe
                            CMD /C sc delete VSSERV
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:4060
                            • C:\Windows\SysWOW64\sc.exe
                              sc delete VSSERV
                              7⤵
                              • Launches sc.exe
                              • System Location Discovery: System Language Discovery
                              PID:2768
                          • C:\Windows\SysWOW64\CMD.exe
                            CMD /C net stop avg8wd
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:2984
                            • C:\Windows\SysWOW64\net.exe
                              net stop avg8wd
                              7⤵
                              • System Location Discovery: System Language Discovery
                              PID:4024
                              • C:\Windows\SysWOW64\net1.exe
                                C:\Windows\system32\net1 stop avg8wd
                                8⤵
                                • System Location Discovery: System Language Discovery
                                PID:1140
                          • C:\Windows\SysWOW64\CMD.exe
                            CMD /C sc stop avg8wd
                            6⤵
                            • System Location Discovery: System Language Discovery
                            PID:3624
                            • C:\Windows\SysWOW64\sc.exe
                              sc stop avg8wd
                              7⤵
                              • Launches sc.exe
                              PID:3280
                          • C:\Windows\SysWOW64\CMD.exe
                            CMD /C sc config avg8wd start= disabled
                            6⤵
                              PID:3468
                              • C:\Windows\SysWOW64\sc.exe
                                sc config avg8wd start= disabled
                                7⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:4536
                            • C:\Windows\SysWOW64\CMD.exe
                              CMD /C sc delete avg8wd
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:3008
                              • C:\Windows\SysWOW64\sc.exe
                                sc delete avg8wd
                                7⤵
                                • Launches sc.exe
                                • System Location Discovery: System Language Discovery
                                PID:1192
                            • C:\Windows\SysWOW64\CMD.exe
                              CMD /C net stop NOD32krn
                              6⤵
                              • System Location Discovery: System Language Discovery
                              PID:2776
                              • C:\Windows\SysWOW64\net.exe
                                net stop NOD32krn
                                7⤵
                                  PID:1936
                                  • C:\Windows\SysWOW64\net1.exe
                                    C:\Windows\system32\net1 stop NOD32krn
                                    8⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2096
                              • C:\Windows\SysWOW64\CMD.exe
                                CMD /C sc stop NOD32krn
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:388
                                • C:\Windows\SysWOW64\sc.exe
                                  sc stop NOD32krn
                                  7⤵
                                  • Launches sc.exe
                                  • System Location Discovery: System Language Discovery
                                  PID:4320
                              • C:\Windows\SysWOW64\CMD.exe
                                CMD /C sc config NOD32krn start= disabled
                                6⤵
                                • System Location Discovery: System Language Discovery
                                PID:2628
                                • C:\Windows\SysWOW64\sc.exe
                                  sc config NOD32krn start= disabled
                                  7⤵
                                  • Launches sc.exe
                                  • System Location Discovery: System Language Discovery
                                  PID:3352
                              • C:\Windows\SysWOW64\CMD.exe
                                CMD /C sc delete NOD32krn
                                6⤵
                                  PID:2860
                                  • C:\Windows\SysWOW64\sc.exe
                                    sc delete NOD32krn
                                    7⤵
                                    • Launches sc.exe
                                    • System Location Discovery: System Language Discovery
                                    PID:4480
                                • C:\Windows\SysWOW64\CMD.exe
                                  CMD /C net stop SbPF.Launcher
                                  6⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:3348
                                  • C:\Windows\SysWOW64\net.exe
                                    net stop SbPF.Launcher
                                    7⤵
                                      PID:2668
                                      • C:\Windows\SysWOW64\net1.exe
                                        C:\Windows\system32\net1 stop SbPF.Launcher
                                        8⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:836
                                  • C:\Windows\SysWOW64\CMD.exe
                                    CMD /C sc stop SbPF.Launcher
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3320
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc stop SbPF.Launcher
                                      7⤵
                                      • Launches sc.exe
                                      • System Location Discovery: System Language Discovery
                                      PID:1044
                                  • C:\Windows\SysWOW64\CMD.exe
                                    CMD /C sc config SbPF.Launcher start= disabled
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:2256
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc config SbPF.Launcher start= disabled
                                      7⤵
                                      • Launches sc.exe
                                      • System Location Discovery: System Language Discovery
                                      PID:3060
                                  • C:\Windows\SysWOW64\CMD.exe
                                    CMD /C sc delete SbPF.Launcher
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4284
                                    • C:\Windows\SysWOW64\sc.exe
                                      sc delete SbPF.Launcher
                                      7⤵
                                      • Launches sc.exe
                                      PID:4828
                                  • C:\Windows\SysWOW64\CMD.exe
                                    CMD /C net stop SPF4
                                    6⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:4036
                                    • C:\Windows\SysWOW64\net.exe
                                      net stop SPF4
                                      7⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4048
                                      • C:\Windows\SysWOW64\net1.exe
                                        C:\Windows\system32\net1 stop SPF4
                                        8⤵
                                          PID:3380
                                    • C:\Windows\SysWOW64\CMD.exe
                                      CMD /C sc stop SPF4
                                      6⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4208
                                      • C:\Windows\SysWOW64\sc.exe
                                        sc stop SPF4
                                        7⤵
                                        • Launches sc.exe
                                        • System Location Discovery: System Language Discovery
                                        PID:4112
                                    • C:\Windows\SysWOW64\CMD.exe
                                      CMD /C sc config SPF4 start= disabled
                                      6⤵
                                        PID:3652
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc config SPF4 start= disabled
                                          7⤵
                                          • Launches sc.exe
                                          • System Location Discovery: System Language Discovery
                                          PID:3208
                                      • C:\Windows\SysWOW64\CMD.exe
                                        CMD /C sc delete SPF4
                                        6⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:4424
                                        • C:\Windows\SysWOW64\sc.exe
                                          sc delete SPF4
                                          7⤵
                                          • Launches sc.exe
                                          • System Location Discovery: System Language Discovery
                                          PID:2560
                                      • C:\Windows\SysWOW64\CMD.exe
                                        CMD /C net stop acssrv
                                        6⤵
                                          PID:1836
                                          • C:\Windows\SysWOW64\net.exe
                                            net stop acssrv
                                            7⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:1548
                                            • C:\Windows\SysWOW64\net1.exe
                                              C:\Windows\system32\net1 stop acssrv
                                              8⤵
                                                PID:3552
                                          • C:\Windows\SysWOW64\CMD.exe
                                            CMD /C sc stop acssrv
                                            6⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3172
                                            • C:\Windows\SysWOW64\sc.exe
                                              sc stop acssrv
                                              7⤵
                                              • Launches sc.exe
                                              PID:4976
                                          • C:\Windows\SysWOW64\CMD.exe
                                            CMD /C sc config acssrv start= disabled
                                            6⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:2896
                                            • C:\Windows\SysWOW64\sc.exe
                                              sc config acssrv start= disabled
                                              7⤵
                                              • Launches sc.exe
                                              PID:3372
                                          • C:\Windows\SysWOW64\CMD.exe
                                            CMD /C sc delete acssrv
                                            6⤵
                                              PID:4400
                                              • C:\Windows\SysWOW64\sc.exe
                                                sc delete acssrv
                                                7⤵
                                                • Launches sc.exe
                                                PID:3912
                                            • C:\Windows\SysWOW64\ipconfig.exe
                                              ipconfig /flushdns
                                              6⤵
                                              • Gathers network information
                                              PID:4068
                                            • C:\Windows\SysWOW64\ipconfig.exe
                                              ipconfig /flushdns
                                              6⤵
                                              • System Location Discovery: System Language Discovery
                                              • Gathers network information
                                              PID:3968
                                        • C:\Windows\SysWOW64\CMD.exe
                                          CMD /C del /F /S /Q *.zip
                                          4⤵
                                            PID:4952
                                          • C:\Windows\SysWOW64\cmd.exe
                                            "C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\BD0802~1.EXE > nul
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3704

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Windows\SysWOW64\wmipsrt.exe

                                      Filesize

                                      79KB

                                      MD5

                                      bd0802393b51f7b88fd1caf18cfb9d59

                                      SHA1

                                      dfca89f012d85280a32517e8541ce219dbc1cf84

                                      SHA256

                                      f42ee437ef9c0ca78a4cead554f84704b79b9092284db57923f5a480c3ac0065

                                      SHA512

                                      3c5ac1a277ace1e98052968f02a8e724327146c6b9c9aab73f6a594b43bc5a40f7200e6e15d69abd43a8b2db932c53ee7df44fd8ba42f7ab73685b93f900bb2d

                                    • C:\Windows\System32\drivers\etc\hosts

                                      Filesize

                                      15KB

                                      MD5

                                      96d179abc939ae4cc8f6d61cb8b6fe6d

                                      SHA1

                                      004f2c2f14a8d1bf66a0bf3d3e71e23b68dd5b7a

                                      SHA256

                                      aa2d65cfa18eac8f7f1a22ddc6b06eed4b5b6acf4de8313a3847d4c036295194

                                      SHA512

                                      434c54224c43710e44f700f76fcb4935216daac882cdab72d1e078e5b86f1f99342ad6d2b6aefa645277aa2fb7b06ee9c1c2f1d82b833b8517c1d5427dc78719

                                    • memory/2588-0-0x0000000000400000-0x000000000041C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/2588-3-0x0000000000400000-0x000000000041C000-memory.dmp

                                      Filesize

                                      112KB

                                    • memory/3120-1-0x0000000001000000-0x0000000001074000-memory.dmp

                                      Filesize

                                      464KB

                                    • memory/3120-4-0x0000000001000000-0x0000000001074000-memory.dmp

                                      Filesize

                                      464KB

                                    • memory/3120-5-0x0000000001000000-0x0000000001074000-memory.dmp

                                      Filesize

                                      464KB

                                    • memory/3120-12-0x0000000001000000-0x0000000001074000-memory.dmp

                                      Filesize

                                      464KB

                                    • memory/3728-16-0x0000000001000000-0x0000000001074000-memory.dmp

                                      Filesize

                                      464KB

                                    • memory/3728-17-0x0000000001000000-0x0000000001074000-memory.dmp

                                      Filesize

                                      464KB

                                    • memory/3728-18-0x0000000001000000-0x0000000001074000-memory.dmp

                                      Filesize

                                      464KB