Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
09/12/2024, 18:34
Static task
static1
Behavioral task
behavioral1
Sample
daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe
-
Size
100KB
-
MD5
daf8db2a5f42d747695fab3dcde462dc
-
SHA1
cce672c5d96360f4322697f042da7fa46833fe41
-
SHA256
06cf0bf09ae5a8e2f1a0e29fa9aee1f4f17533173c4917ec156acc50aa008467
-
SHA512
cb213e74f867fdfdb8876b4a05fc15cd9fc7e7ba1c5352acf6e4f2ff8c51144019dcb6e7b9614cd84f6ad219093901db9616a7f93a12f04af40a51277447e0aa
-
SSDEEP
1536:eAlCqSOVMz0OjzknsqxNa5wXVTZ/fgObourcS644R4fQUWV4liPp3R0Wnjq:eMsqja8TVvMu4SMR4Q1Viivjq
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 2 IoCs
pid Process 2080 services.exe 2788 services.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Data Serivce = "services.exe" daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2064 set thread context of 1672 2064 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 30 PID 2080 set thread context of 2788 2080 services.exe 34 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\services.exe daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe File opened for modification C:\Windows\services.exe daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe -
Runs net.exe
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2064 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 2080 services.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 2064 wrote to memory of 1672 2064 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 30 PID 2064 wrote to memory of 1672 2064 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 30 PID 2064 wrote to memory of 1672 2064 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 30 PID 2064 wrote to memory of 1672 2064 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 30 PID 2064 wrote to memory of 1672 2064 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 30 PID 2064 wrote to memory of 1672 2064 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 30 PID 2064 wrote to memory of 1672 2064 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 30 PID 2064 wrote to memory of 1672 2064 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 30 PID 2064 wrote to memory of 1672 2064 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 30 PID 2064 wrote to memory of 1672 2064 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 30 PID 1672 wrote to memory of 2504 1672 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 31 PID 1672 wrote to memory of 2504 1672 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 31 PID 1672 wrote to memory of 2504 1672 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 31 PID 1672 wrote to memory of 2504 1672 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 31 PID 1672 wrote to memory of 2080 1672 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 33 PID 1672 wrote to memory of 2080 1672 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 33 PID 1672 wrote to memory of 2080 1672 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 33 PID 1672 wrote to memory of 2080 1672 daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe 33 PID 2080 wrote to memory of 2788 2080 services.exe 34 PID 2080 wrote to memory of 2788 2080 services.exe 34 PID 2080 wrote to memory of 2788 2080 services.exe 34 PID 2080 wrote to memory of 2788 2080 services.exe 34 PID 2080 wrote to memory of 2788 2080 services.exe 34 PID 2080 wrote to memory of 2788 2080 services.exe 34 PID 2080 wrote to memory of 2788 2080 services.exe 34 PID 2080 wrote to memory of 2788 2080 services.exe 34 PID 2080 wrote to memory of 2788 2080 services.exe 34 PID 2080 wrote to memory of 2788 2080 services.exe 34 PID 2504 wrote to memory of 2844 2504 cmd.exe 35 PID 2504 wrote to memory of 2844 2504 cmd.exe 35 PID 2504 wrote to memory of 2844 2504 cmd.exe 35 PID 2504 wrote to memory of 2844 2504 cmd.exe 35 PID 2788 wrote to memory of 2932 2788 services.exe 37 PID 2788 wrote to memory of 2932 2788 services.exe 37 PID 2788 wrote to memory of 2932 2788 services.exe 37 PID 2788 wrote to memory of 2932 2788 services.exe 37 PID 2844 wrote to memory of 2936 2844 net.exe 36 PID 2844 wrote to memory of 2936 2844 net.exe 36 PID 2844 wrote to memory of 2936 2844 net.exe 36 PID 2844 wrote to memory of 2936 2844 net.exe 36 PID 2932 wrote to memory of 2856 2932 cmd.exe 39 PID 2932 wrote to memory of 2856 2932 cmd.exe 39 PID 2932 wrote to memory of 2856 2932 cmd.exe 39 PID 2932 wrote to memory of 2856 2932 cmd.exe 39 PID 2856 wrote to memory of 2952 2856 net.exe 40 PID 2856 wrote to memory of 2952 2856 net.exe 40 PID 2856 wrote to memory of 2952 2856 net.exe 40 PID 2856 wrote to memory of 2952 2856 net.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\daf8db2a5f42d747695fab3dcde462dc_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\x.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
-
-
C:\Windows\services.exe"C:\Windows\services.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\services.exe"C:\Windows\services.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\x.bat" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"7⤵
- System Location Discovery: System Language Discovery
PID:2952
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
100KB
MD5daf8db2a5f42d747695fab3dcde462dc
SHA1cce672c5d96360f4322697f042da7fa46833fe41
SHA25606cf0bf09ae5a8e2f1a0e29fa9aee1f4f17533173c4917ec156acc50aa008467
SHA512cb213e74f867fdfdb8876b4a05fc15cd9fc7e7ba1c5352acf6e4f2ff8c51144019dcb6e7b9614cd84f6ad219093901db9616a7f93a12f04af40a51277447e0aa
-
Filesize
53B
MD5e6ed7be2b9572503f07663ca6e53759f
SHA17ad80bd38f2a27e06c111b551c76ad0a0585c194
SHA256b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9
SHA512e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227