Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 16:05
Static task
static1
Behavioral task
behavioral1
Sample
cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe
-
Size
137KB
-
MD5
cde18a961db903ddf473e22bc856b626
-
SHA1
73e1bcb550453ce92e009076e9e5a5b6078f1761
-
SHA256
dc2d3a37a9df088602faaa2cd6e13b76bfdde97c547a7b1de96c3e5a2df25932
-
SHA512
3ad70a1b395ad3700b347ad7a537c40f334b74e9c6b7ef7e963bca029a0d16faa82cfa055b612eb0c164ed9a79a25dba217ce91ae91870f7609f7e31396f1e3c
-
SSDEEP
3072:acdoULbBzcf8p80JRtJkhPib7q3MS+6RdAHD:bo6ycJjoM7hS+6RiHD
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation services.exe -
Executes dropped EXE 2 IoCs
pid Process 1344 services.exe 4952 services.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Data Serivce = "services.exe" cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2160 set thread context of 536 2160 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 82 PID 1344 set thread context of 4952 1344 services.exe 86 -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\services.exe services.exe File created C:\Windows\services.exe cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe File opened for modification C:\Windows\services.exe cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2160 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 1344 services.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2160 wrote to memory of 536 2160 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 82 PID 2160 wrote to memory of 536 2160 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 82 PID 2160 wrote to memory of 536 2160 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 82 PID 2160 wrote to memory of 536 2160 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 82 PID 2160 wrote to memory of 536 2160 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 82 PID 2160 wrote to memory of 536 2160 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 82 PID 2160 wrote to memory of 536 2160 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 82 PID 2160 wrote to memory of 536 2160 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 82 PID 2160 wrote to memory of 536 2160 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 82 PID 536 wrote to memory of 1576 536 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 83 PID 536 wrote to memory of 1576 536 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 83 PID 536 wrote to memory of 1576 536 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 83 PID 536 wrote to memory of 1344 536 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 85 PID 536 wrote to memory of 1344 536 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 85 PID 536 wrote to memory of 1344 536 cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe 85 PID 1344 wrote to memory of 4952 1344 services.exe 86 PID 1344 wrote to memory of 4952 1344 services.exe 86 PID 1344 wrote to memory of 4952 1344 services.exe 86 PID 1344 wrote to memory of 4952 1344 services.exe 86 PID 1344 wrote to memory of 4952 1344 services.exe 86 PID 1344 wrote to memory of 4952 1344 services.exe 86 PID 1344 wrote to memory of 4952 1344 services.exe 86 PID 1344 wrote to memory of 4952 1344 services.exe 86 PID 1344 wrote to memory of 4952 1344 services.exe 86 PID 1576 wrote to memory of 1144 1576 cmd.exe 87 PID 1576 wrote to memory of 1144 1576 cmd.exe 87 PID 1576 wrote to memory of 1144 1576 cmd.exe 87 PID 1144 wrote to memory of 1936 1144 net.exe 88 PID 1144 wrote to memory of 1936 1144 net.exe 88 PID 1144 wrote to memory of 1936 1144 net.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\cde18a961db903ddf473e22bc856b626_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\cde18a961db903ddf473e22bc856b626_JaffaCakes118.exe2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\x.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
-
-
C:\Windows\services.exe"C:\Windows\services.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\services.exeC:\Windows\services.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4952
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
137KB
MD5cde18a961db903ddf473e22bc856b626
SHA173e1bcb550453ce92e009076e9e5a5b6078f1761
SHA256dc2d3a37a9df088602faaa2cd6e13b76bfdde97c547a7b1de96c3e5a2df25932
SHA5123ad70a1b395ad3700b347ad7a537c40f334b74e9c6b7ef7e963bca029a0d16faa82cfa055b612eb0c164ed9a79a25dba217ce91ae91870f7609f7e31396f1e3c
-
Filesize
53B
MD5e6ed7be2b9572503f07663ca6e53759f
SHA17ad80bd38f2a27e06c111b551c76ad0a0585c194
SHA256b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9
SHA512e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227