Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 18:29
Static task
static1
Behavioral task
behavioral1
Sample
ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe
-
Size
119KB
-
MD5
ce69fa6d6f3c163026e5f1d6d4297f59
-
SHA1
b58357e71d5535ad2969691393ed123550c44647
-
SHA256
3bc1950de2029e1e228db476e2d6d7d6b4b85ef9cc0d3a856be2f0eeb71c79dc
-
SHA512
2c393bb708f80ccedb11f65b9b814334e51fd5e67896bd9f88d8552d2d52ea33ae0a8e84e3262748d0770804d5da694da462879f075fc0512c37226b19c791cb
-
SSDEEP
3072:eYEoOF8fScyj9f6UgIDzgKMIJ6uOZ2xytZUo:FER0Sv9SUgagKMEb7CD
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Config Setup = "C:\\Windows\\jodrive32.exe" ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2068 jodrive32.exe 2132 jodrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Config Setup = "C:\\Windows\\jodrive32.exe" ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 328 set thread context of 2516 328 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe 30 PID 2068 set thread context of 2132 2068 jodrive32.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\jodrive32.exe ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe File opened for modification C:\Windows\jodrive32.exe ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe File created C:\Windows\%windir%\eilfiie32.log jodrive32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jodrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jodrive32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2516 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe 2516 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 328 wrote to memory of 2516 328 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe 30 PID 328 wrote to memory of 2516 328 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe 30 PID 328 wrote to memory of 2516 328 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe 30 PID 328 wrote to memory of 2516 328 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe 30 PID 328 wrote to memory of 2516 328 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe 30 PID 328 wrote to memory of 2516 328 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe 30 PID 328 wrote to memory of 2516 328 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe 30 PID 328 wrote to memory of 2516 328 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe 30 PID 2516 wrote to memory of 2068 2516 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe 31 PID 2516 wrote to memory of 2068 2516 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe 31 PID 2516 wrote to memory of 2068 2516 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe 31 PID 2516 wrote to memory of 2068 2516 ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe 31 PID 2068 wrote to memory of 2132 2068 jodrive32.exe 32 PID 2068 wrote to memory of 2132 2068 jodrive32.exe 32 PID 2068 wrote to memory of 2132 2068 jodrive32.exe 32 PID 2068 wrote to memory of 2132 2068 jodrive32.exe 32 PID 2068 wrote to memory of 2132 2068 jodrive32.exe 32 PID 2068 wrote to memory of 2132 2068 jodrive32.exe 32 PID 2068 wrote to memory of 2132 2068 jodrive32.exe 32 PID 2068 wrote to memory of 2132 2068 jodrive32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ce69fa6d6f3c163026e5f1d6d4297f59_JaffaCakes118.exe2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\jodrive32.exe"C:\Windows\jodrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\jodrive32.exeC:\Windows\jodrive32.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2132
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5ce69fa6d6f3c163026e5f1d6d4297f59
SHA1b58357e71d5535ad2969691393ed123550c44647
SHA2563bc1950de2029e1e228db476e2d6d7d6b4b85ef9cc0d3a856be2f0eeb71c79dc
SHA5122c393bb708f80ccedb11f65b9b814334e51fd5e67896bd9f88d8552d2d52ea33ae0a8e84e3262748d0770804d5da694da462879f075fc0512c37226b19c791cb