Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
04-12-2024 08:35
Static task
static1
Behavioral task
behavioral1
Sample
c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe
-
Size
172KB
-
MD5
c1b66518ca3bfc089466bb62da627951
-
SHA1
18b4ecdb441299cda5f1423e185ebcdc31b7c4d5
-
SHA256
e0141eb37454ac2c0a9ed115d93b92f0d74f663471f7a2994fc5efd65cf6d2fe
-
SHA512
fe6ea6d049b2cb96b22f6128d7c12dc96ab1fc572b3135600c90a60b04abb7ab6e90bfcaeb2c8410b0ed195db790fd7fb8cd07445d5cfdf4f70b36f077ad6139
-
SSDEEP
3072:IE2He2ONuUxQfLDeqYS8mNJsfbN6JT9+ht:I5+vNuUxAqS8mIToT9q
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 2 IoCs
pid Process 2140 repsvc.exe 264 repsvc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Remote Registry Service = "repsvc.exe" c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2848 set thread context of 2984 2848 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 30 PID 2140 set thread context of 264 2140 repsvc.exe 36 -
resource yara_rule behavioral1/memory/2984-6-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2984-8-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2984-9-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2984-10-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/2984-31-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/264-42-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/264-41-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/264-40-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/264-51-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/264-53-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/264-56-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/264-59-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/264-60-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral1/memory/264-65-0x0000000000400000-0x000000000045E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\repsvc.exe c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe File opened for modification C:\Windows\repsvc.exe c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language repsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language repsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2848 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 2140 repsvc.exe -
Suspicious use of WriteProcessMemory 46 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2984 2848 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 30 PID 2848 wrote to memory of 2984 2848 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 30 PID 2848 wrote to memory of 2984 2848 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 30 PID 2848 wrote to memory of 2984 2848 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 30 PID 2848 wrote to memory of 2984 2848 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 30 PID 2848 wrote to memory of 2984 2848 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 30 PID 2848 wrote to memory of 2984 2848 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 30 PID 2848 wrote to memory of 2984 2848 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 30 PID 2848 wrote to memory of 2984 2848 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 30 PID 2984 wrote to memory of 2856 2984 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2856 2984 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2856 2984 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2856 2984 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 31 PID 2984 wrote to memory of 2140 2984 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 33 PID 2984 wrote to memory of 2140 2984 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 33 PID 2984 wrote to memory of 2140 2984 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 33 PID 2984 wrote to memory of 2140 2984 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 33 PID 2856 wrote to memory of 2764 2856 cmd.exe 34 PID 2856 wrote to memory of 2764 2856 cmd.exe 34 PID 2856 wrote to memory of 2764 2856 cmd.exe 34 PID 2856 wrote to memory of 2764 2856 cmd.exe 34 PID 2764 wrote to memory of 2468 2764 net.exe 35 PID 2764 wrote to memory of 2468 2764 net.exe 35 PID 2764 wrote to memory of 2468 2764 net.exe 35 PID 2764 wrote to memory of 2468 2764 net.exe 35 PID 2140 wrote to memory of 264 2140 repsvc.exe 36 PID 2140 wrote to memory of 264 2140 repsvc.exe 36 PID 2140 wrote to memory of 264 2140 repsvc.exe 36 PID 2140 wrote to memory of 264 2140 repsvc.exe 36 PID 2140 wrote to memory of 264 2140 repsvc.exe 36 PID 2140 wrote to memory of 264 2140 repsvc.exe 36 PID 2140 wrote to memory of 264 2140 repsvc.exe 36 PID 2140 wrote to memory of 264 2140 repsvc.exe 36 PID 2140 wrote to memory of 264 2140 repsvc.exe 36 PID 264 wrote to memory of 376 264 repsvc.exe 37 PID 264 wrote to memory of 376 264 repsvc.exe 37 PID 264 wrote to memory of 376 264 repsvc.exe 37 PID 264 wrote to memory of 376 264 repsvc.exe 37 PID 376 wrote to memory of 2404 376 cmd.exe 39 PID 376 wrote to memory of 2404 376 cmd.exe 39 PID 376 wrote to memory of 2404 376 cmd.exe 39 PID 376 wrote to memory of 2404 376 cmd.exe 39 PID 2404 wrote to memory of 2596 2404 net.exe 40 PID 2404 wrote to memory of 2596 2404 net.exe 40 PID 2404 wrote to memory of 2596 2404 net.exe 40 PID 2404 wrote to memory of 2596 2404 net.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\x.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:2468
-
-
-
-
C:\Windows\repsvc.exe"C:\Windows\repsvc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\repsvc.exe"C:\Windows\repsvc.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\x.bat" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"7⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5c1b66518ca3bfc089466bb62da627951
SHA118b4ecdb441299cda5f1423e185ebcdc31b7c4d5
SHA256e0141eb37454ac2c0a9ed115d93b92f0d74f663471f7a2994fc5efd65cf6d2fe
SHA512fe6ea6d049b2cb96b22f6128d7c12dc96ab1fc572b3135600c90a60b04abb7ab6e90bfcaeb2c8410b0ed195db790fd7fb8cd07445d5cfdf4f70b36f077ad6139
-
Filesize
53B
MD5e6ed7be2b9572503f07663ca6e53759f
SHA17ad80bd38f2a27e06c111b551c76ad0a0585c194
SHA256b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9
SHA512e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227