Analysis
-
max time kernel
144s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-12-2024 21:22
Static task
static1
Behavioral task
behavioral1
Sample
db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe
-
Size
59KB
-
MD5
db973c62fe30bda177b80b5c41b15240
-
SHA1
9204b1ed600482d5f4b6d7773ae87c2adc89a692
-
SHA256
d1fcd376c602850b9fdff7903a1d2dd8e73439f5a6ec355a7bc3559e89b34148
-
SHA512
2823e35cd369de30bbcded8067398b8f26cf452dfb4c15af93b80ce1a0c40d89f74d12d2e3f0174630ddbf9cc2fcc3fe13a543a1dafc79be9f1709d2e60fb101
-
SSDEEP
1536:LoI4vTx/yBclR9xck92zm1LYlOcvZUZ7X:8IA/+clR4kEzZI6UxX
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\wjdrive32.exe" db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2796 wjdrive32.exe 4104 wjdrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\wjdrive32.exe" db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4272 set thread context of 3496 4272 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 83 PID 2796 set thread context of 4104 2796 wjdrive32.exe 86 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\wjdrive32.exe db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe File opened for modification C:\Windows\wjdrive32.exe db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe File created C:\Windows\%windir%\lfffile32.log wjdrive32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjdrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wjdrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3496 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 3496 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 3496 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 3496 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4272 wrote to memory of 3496 4272 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 83 PID 4272 wrote to memory of 3496 4272 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 83 PID 4272 wrote to memory of 3496 4272 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 83 PID 4272 wrote to memory of 3496 4272 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 83 PID 4272 wrote to memory of 3496 4272 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 83 PID 4272 wrote to memory of 3496 4272 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 83 PID 4272 wrote to memory of 3496 4272 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 83 PID 4272 wrote to memory of 3496 4272 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 83 PID 3496 wrote to memory of 2796 3496 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 84 PID 3496 wrote to memory of 2796 3496 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 84 PID 3496 wrote to memory of 2796 3496 db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe 84 PID 2796 wrote to memory of 4104 2796 wjdrive32.exe 86 PID 2796 wrote to memory of 4104 2796 wjdrive32.exe 86 PID 2796 wrote to memory of 4104 2796 wjdrive32.exe 86 PID 2796 wrote to memory of 4104 2796 wjdrive32.exe 86 PID 2796 wrote to memory of 4104 2796 wjdrive32.exe 86 PID 2796 wrote to memory of 4104 2796 wjdrive32.exe 86 PID 2796 wrote to memory of 4104 2796 wjdrive32.exe 86 PID 2796 wrote to memory of 4104 2796 wjdrive32.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db973c62fe30bda177b80b5c41b15240_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\wjdrive32.exe"C:\Windows\wjdrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\wjdrive32.exe"C:\Windows\wjdrive32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4104
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5db973c62fe30bda177b80b5c41b15240
SHA19204b1ed600482d5f4b6d7773ae87c2adc89a692
SHA256d1fcd376c602850b9fdff7903a1d2dd8e73439f5a6ec355a7bc3559e89b34148
SHA5122823e35cd369de30bbcded8067398b8f26cf452dfb4c15af93b80ce1a0c40d89f74d12d2e3f0174630ddbf9cc2fcc3fe13a543a1dafc79be9f1709d2e60fb101