Analysis
-
max time kernel
147s -
max time network
159s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 08:35
Static task
static1
Behavioral task
behavioral1
Sample
c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe
-
Size
172KB
-
MD5
c1b66518ca3bfc089466bb62da627951
-
SHA1
18b4ecdb441299cda5f1423e185ebcdc31b7c4d5
-
SHA256
e0141eb37454ac2c0a9ed115d93b92f0d74f663471f7a2994fc5efd65cf6d2fe
-
SHA512
fe6ea6d049b2cb96b22f6128d7c12dc96ab1fc572b3135600c90a60b04abb7ab6e90bfcaeb2c8410b0ed195db790fd7fb8cd07445d5cfdf4f70b36f077ad6139
-
SSDEEP
3072:IE2He2ONuUxQfLDeqYS8mNJsfbN6JT9+ht:I5+vNuUxAqS8mIToT9q
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation repsvc.exe -
Executes dropped EXE 2 IoCs
pid Process 780 repsvc.exe 3216 repsvc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Remote Registry Service = "repsvc.exe" c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 5020 set thread context of 1824 5020 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 83 PID 780 set thread context of 3216 780 repsvc.exe 89 -
resource yara_rule behavioral2/memory/1824-2-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/1824-4-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/1824-5-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/1824-6-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/1824-20-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/3216-24-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/3216-26-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/3216-25-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/3216-30-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/3216-32-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/3216-34-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/3216-35-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/3216-39-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/3216-43-0x0000000000400000-0x000000000045E000-memory.dmp upx behavioral2/memory/3216-46-0x0000000000400000-0x000000000045E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\repsvc.exe c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe File created C:\Windows\repsvc.exe c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language repsvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language repsvc.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 5020 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 780 repsvc.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 5020 wrote to memory of 1824 5020 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 83 PID 5020 wrote to memory of 1824 5020 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 83 PID 5020 wrote to memory of 1824 5020 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 83 PID 5020 wrote to memory of 1824 5020 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 83 PID 5020 wrote to memory of 1824 5020 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 83 PID 5020 wrote to memory of 1824 5020 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 83 PID 5020 wrote to memory of 1824 5020 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 83 PID 5020 wrote to memory of 1824 5020 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 83 PID 1824 wrote to memory of 3100 1824 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 84 PID 1824 wrote to memory of 3100 1824 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 84 PID 1824 wrote to memory of 3100 1824 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 84 PID 1824 wrote to memory of 780 1824 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 86 PID 1824 wrote to memory of 780 1824 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 86 PID 1824 wrote to memory of 780 1824 c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe 86 PID 3100 wrote to memory of 180 3100 cmd.exe 87 PID 3100 wrote to memory of 180 3100 cmd.exe 87 PID 3100 wrote to memory of 180 3100 cmd.exe 87 PID 180 wrote to memory of 436 180 net.exe 88 PID 180 wrote to memory of 436 180 net.exe 88 PID 180 wrote to memory of 436 180 net.exe 88 PID 780 wrote to memory of 3216 780 repsvc.exe 89 PID 780 wrote to memory of 3216 780 repsvc.exe 89 PID 780 wrote to memory of 3216 780 repsvc.exe 89 PID 780 wrote to memory of 3216 780 repsvc.exe 89 PID 780 wrote to memory of 3216 780 repsvc.exe 89 PID 780 wrote to memory of 3216 780 repsvc.exe 89 PID 780 wrote to memory of 3216 780 repsvc.exe 89 PID 780 wrote to memory of 3216 780 repsvc.exe 89 PID 3216 wrote to memory of 4244 3216 repsvc.exe 91 PID 3216 wrote to memory of 4244 3216 repsvc.exe 91 PID 3216 wrote to memory of 4244 3216 repsvc.exe 91 PID 4244 wrote to memory of 2740 4244 cmd.exe 94 PID 4244 wrote to memory of 2740 4244 cmd.exe 94 PID 4244 wrote to memory of 2740 4244 cmd.exe 94 PID 2740 wrote to memory of 2576 2740 net.exe 95 PID 2740 wrote to memory of 2576 2740 net.exe 95 PID 2740 wrote to memory of 2576 2740 net.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c1b66518ca3bfc089466bb62da627951_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\x.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:180 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:436
-
-
-
-
C:\Windows\repsvc.exe"C:\Windows\repsvc.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\repsvc.exe"C:\Windows\repsvc.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\x.bat" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"7⤵
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5c1b66518ca3bfc089466bb62da627951
SHA118b4ecdb441299cda5f1423e185ebcdc31b7c4d5
SHA256e0141eb37454ac2c0a9ed115d93b92f0d74f663471f7a2994fc5efd65cf6d2fe
SHA512fe6ea6d049b2cb96b22f6128d7c12dc96ab1fc572b3135600c90a60b04abb7ab6e90bfcaeb2c8410b0ed195db790fd7fb8cd07445d5cfdf4f70b36f077ad6139
-
Filesize
53B
MD5e6ed7be2b9572503f07663ca6e53759f
SHA17ad80bd38f2a27e06c111b551c76ad0a0585c194
SHA256b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9
SHA512e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227