Analysis
-
max time kernel
143s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 21:22
Static task
static1
Behavioral task
behavioral1
Sample
db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe
-
Size
59KB
-
MD5
db973c62fe30bda177b80b5c41b15240
-
SHA1
9204b1ed600482d5f4b6d7773ae87c2adc89a692
-
SHA256
d1fcd376c602850b9fdff7903a1d2dd8e73439f5a6ec355a7bc3559e89b34148
-
SHA512
2823e35cd369de30bbcded8067398b8f26cf452dfb4c15af93b80ce1a0c40d89f74d12d2e3f0174630ddbf9cc2fcc3fe13a543a1dafc79be9f1709d2e60fb101
-
SSDEEP
1536:LoI4vTx/yBclR9xck92zm1LYlOcvZUZ7X:8IA/+clR4kEzZI6UxX
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\wjdrive32.exe" db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 860 wjdrive32.exe 1932 wjdrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\wjdrive32.exe" db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2604 set thread context of 2608 2604 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 30 PID 860 set thread context of 1932 860 wjdrive32.exe 32 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\%windir%\lfffile32.log wjdrive32.exe File created C:\Windows\wjdrive32.exe db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe File opened for modification C:\Windows\wjdrive32.exe db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjdrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjdrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2608 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 2608 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2608 2604 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 30 PID 2604 wrote to memory of 2608 2604 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 30 PID 2604 wrote to memory of 2608 2604 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 30 PID 2604 wrote to memory of 2608 2604 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 30 PID 2604 wrote to memory of 2608 2604 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 30 PID 2604 wrote to memory of 2608 2604 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 30 PID 2604 wrote to memory of 2608 2604 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 30 PID 2604 wrote to memory of 2608 2604 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 30 PID 2604 wrote to memory of 2608 2604 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 30 PID 2608 wrote to memory of 860 2608 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 31 PID 2608 wrote to memory of 860 2608 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 31 PID 2608 wrote to memory of 860 2608 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 31 PID 2608 wrote to memory of 860 2608 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 31 PID 860 wrote to memory of 1932 860 wjdrive32.exe 32 PID 860 wrote to memory of 1932 860 wjdrive32.exe 32 PID 860 wrote to memory of 1932 860 wjdrive32.exe 32 PID 860 wrote to memory of 1932 860 wjdrive32.exe 32 PID 860 wrote to memory of 1932 860 wjdrive32.exe 32 PID 860 wrote to memory of 1932 860 wjdrive32.exe 32 PID 860 wrote to memory of 1932 860 wjdrive32.exe 32 PID 860 wrote to memory of 1932 860 wjdrive32.exe 32 PID 860 wrote to memory of 1932 860 wjdrive32.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\wjdrive32.exe"C:\Windows\wjdrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\wjdrive32.exe"C:\Windows\wjdrive32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1932
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5db973c62fe30bda177b80b5c41b15240
SHA19204b1ed600482d5f4b6d7773ae87c2adc89a692
SHA256d1fcd376c602850b9fdff7903a1d2dd8e73439f5a6ec355a7bc3559e89b34148
SHA5122823e35cd369de30bbcded8067398b8f26cf452dfb4c15af93b80ce1a0c40d89f74d12d2e3f0174630ddbf9cc2fcc3fe13a543a1dafc79be9f1709d2e60fb101