Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 02:00
Static task
static1
Behavioral task
behavioral1
Sample
c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe
-
Size
264KB
-
MD5
c04ad7b4f0bf3cd74688222681c7ca02
-
SHA1
6227d30cf6a51824826628a0269870e26d4b75e8
-
SHA256
945895dc959d46aae26c56c22a8271d3acd83cd6b3b2bbcbc4a846a5c2202515
-
SHA512
ca0340ee7c2532950f8d9d73c7bcf51b3c8622a2b937efd42d20127c2b9fa7128d1a42bd7d7f0ae9032d4684371cf783ac43cc60b6390ab39fe1d3b90aa5d4b9
-
SSDEEP
3072:4ZrZand/N76dTWQllamyqRw0er5aQd+JmrWdPDPPanTYF8uG78mxjEwpFOA7jn:5nX76jxyq2adEr4LuUW78mx4sf
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmpla64.exe = "C:\\Windows\\SysWOW64\\wmpla64.exe:*:Enabled:Windows Media Player" wmpla64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List wmpla64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile wmpla64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications wmpla64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmpla64.exe = "C:\\Windows\\SysWOW64\\wmpla64.exe:*:Enabled:Windows Media Player" wmpla64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List wmpla64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile wmpla64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications wmpla64.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastUI.exe wmpla64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastUI.exe\Debugger = "CMD /C>null" wmpla64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avast.setup\Debugger = "CMD /C>null" wmpla64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastSvc.exe wmpla64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\AvastSvc.exe\Debugger = "CMD /C>null" wmpla64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe\Debugger = "CMD /C>null" wmpla64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe\Debugger = "CMD /C>null" wmpla64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\msseces.exe wmpla64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avast.setup wmpla64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe wmpla64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe wmpla64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MsMpEng.exe\Debugger = "CMD /C>null" wmpla64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\epplauncher.exe wmpla64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\epplauncher.exe\Debugger = "CMD /C>null" wmpla64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\egui.exe\Debugger = "CMD /C>null" wmpla64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ekrn.exe wmpla64.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe wmpla64.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\MpCmdRun.exe\Debugger = "CMD /C>null" wmpla64.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 4388 wmpla64.exe -
Executes dropped EXE 2 IoCs
pid Process 2060 wmpla64.exe 4388 wmpla64.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Media Player = "C:\\Windows\\SysWOW64\\wmpla64.exe" wmpla64.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpla64.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpla64.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wmpla64.exe c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpla64.exe c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ wmpla64.exe File opened for modification C:\Windows\SysWOW64\wmpla64.exe wmpla64.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1884 set thread context of 3928 1884 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 82 PID 2060 set thread context of 4388 2060 wmpla64.exe 86 -
resource yara_rule behavioral2/memory/3928-0-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3928-2-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3928-4-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3928-3-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3928-38-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4388-44-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4388-46-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4388-47-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4388-48-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4388-55-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpla64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpla64.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 3928 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 3928 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 3928 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 3928 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe 4388 wmpla64.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1884 wrote to memory of 3928 1884 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 82 PID 1884 wrote to memory of 3928 1884 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 82 PID 1884 wrote to memory of 3928 1884 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 82 PID 1884 wrote to memory of 3928 1884 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 82 PID 1884 wrote to memory of 3928 1884 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 82 PID 1884 wrote to memory of 3928 1884 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 82 PID 1884 wrote to memory of 3928 1884 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 82 PID 1884 wrote to memory of 3928 1884 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 82 PID 3928 wrote to memory of 2060 3928 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 85 PID 3928 wrote to memory of 2060 3928 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 85 PID 3928 wrote to memory of 2060 3928 c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe 85 PID 2060 wrote to memory of 4388 2060 wmpla64.exe 86 PID 2060 wrote to memory of 4388 2060 wmpla64.exe 86 PID 2060 wrote to memory of 4388 2060 wmpla64.exe 86 PID 2060 wrote to memory of 4388 2060 wmpla64.exe 86 PID 2060 wrote to memory of 4388 2060 wmpla64.exe 86 PID 2060 wrote to memory of 4388 2060 wmpla64.exe 86 PID 2060 wrote to memory of 4388 2060 wmpla64.exe 86 PID 2060 wrote to memory of 4388 2060 wmpla64.exe 86 PID 4388 wrote to memory of 3448 4388 wmpla64.exe 56 PID 4388 wrote to memory of 3448 4388 wmpla64.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c04ad7b4f0bf3cd74688222681c7ca02_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\wmpla64.exe"C:\Windows\SysWOW64\wmpla64.exe" C:\Users\Admin\AppData\Local\Temp\C04AD7~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\wmpla64.exe"C:\Windows\SysWOW64\wmpla64.exe" C:\Users\Admin\AppData\Local\Temp\C04AD7~1.EXE5⤵
- Modifies firewall policy service
- Event Triggered Execution: Image File Execution Options Injection
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4388
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
264KB
MD5c04ad7b4f0bf3cd74688222681c7ca02
SHA16227d30cf6a51824826628a0269870e26d4b75e8
SHA256945895dc959d46aae26c56c22a8271d3acd83cd6b3b2bbcbc4a846a5c2202515
SHA512ca0340ee7c2532950f8d9d73c7bcf51b3c8622a2b937efd42d20127c2b9fa7128d1a42bd7d7f0ae9032d4684371cf783ac43cc60b6390ab39fe1d3b90aa5d4b9