Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-12-2024 14:18
Behavioral task
behavioral1
Sample
e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe
-
Size
143KB
-
MD5
e1d83034bbf6a31c35bbcee0ecd0b491
-
SHA1
46b3b9f1ac677ba0daa2a7305fa7307c59cf985e
-
SHA256
d50d551612f0d81c35677a0f2fe2ab16f78c5f2842948011d2b9bc387127b83c
-
SHA512
f5860771564d2836af6250be4087fbd27f25506ed15871829c18dcb5021e990e4d59e8c99a3256e40e3e24a019d8d0e048a79d80edd511ad55bad9130b745141
-
SSDEEP
1536:3wwpWESzX4dia8O99dSuwrCq7StPoPAWgUIYFMSiU7a4+dwvEsyGpaDVGcc3s/b:gfBr4ogHIzuYFnB7a4+a8syGp7V3sT
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools mshost.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 2348 netsh.exe 2628 netsh.exe -
Deletes itself 1 IoCs
pid Process 2840 mshost.exe -
Executes dropped EXE 2 IoCs
pid Process 2448 mshost.exe 2840 mshost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\mshost = "C:\\Windows\\mshost.exe" e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2108 set thread context of 2552 2108 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 30 PID 2448 set thread context of 2840 2448 mshost.exe 37 -
resource yara_rule behavioral1/memory/2108-0-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2108-5-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/files/0x0008000000016c47-25.dat upx behavioral1/memory/2448-28-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral1/memory/2448-36-0x0000000000400000-0x000000000042C000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\grokster\my grokster\AOL Instant Messenger (AIM) Cracker.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\Myspace Cracker.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Kaspersky 2009 Full Suite Crack.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Microsoft Visual Basic 2008 KeyGen.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\MSN Hacker 2008.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\Tcpip Patch.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Microsoft Visual Studio 6 KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\RuneScape 2008 - Newest Exploits.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Tcpip Patch.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\PhotoShop Keygen.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\Microsoft Visual Basic 6 KeyGen.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\MSN Live Password Cracker.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Limewire Pro Downloader.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Myspace Bruteforce.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\WOW Account Cracker.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Hotmail Cracker.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Windows XP Keygen mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Password Cracker.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\DeadSpace KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\DivX Pro KeyGen.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\DivX Pro KeyGen.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Half-Life 2 WORKS-ON-STEAM.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Limewire Speed Patch mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\Microsoft Visual C++ 6 KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\Tcpip Patch.exe mshost.exe File created C:\Program Files (x86)\tesla\files\Microsoft Visual Studio 2008 KeyGen.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Nod32 Crack.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\RuneScape 2008 - Newest Exploits.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Left4Dead-STEAM-Online-Crack-WORKS-DECEMBER08.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\ICQ Account Cracker.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Adobe Photoshop CS3 Keygen.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\Project 7 Private 4.8.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Left4Dead-STEAM-Online-Crack-WORKS-DECEMBER08.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\MSN Hacker 2008.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Hotmail Hacker.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\YIM HAcker 2008.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Windows XP Keygen mshost.exe File created C:\Program Files (x86)\emule\incoming\Left4Dead-STEAM-Online-Crack-WORKS-DECEMBER08.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Password Cracker.exe mshost.exe File created C:\Program Files (x86)\tesla\files\Virus Generator.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Counter-Strike Source KeyGen.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Windows 2008 Server KeyGen.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\YIM HAcker 2009.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\Adobe Keygen.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\Microsoft Visual Studio 6 KeyGen.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\DivX Pro KeyGen.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Microsoft Visual C++ 6 KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\DivX Pro KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\AOL Hacker 2009.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\RuneScape Gold Exploit.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\Left4Dead-STEAM-Online-Crack-WORKS-DECEMBER08.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Limewire Pro Downloader.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Windows XP Crack.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Photoshop Crack.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Microsoft Visual Studio 6 KeyGen.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Limewire Pro Downloader.exe mshost.exe File created C:\Program Files (x86)\tesla\files\Microsoft Visual C++ 6 KeyGen.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\Virus Generator.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\Nod32 Keygen.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Myspace Cracker.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\YIM HAcker 2008.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\MSN Hacker 2009.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\DeadSpace KeyGen.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\Project 7 Private 4.8.exe mshost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\mshost.exe e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe File opened for modification C:\Windows\mshost.exe e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshost.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2552 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 2552 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe 2840 mshost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2108 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 2448 mshost.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2552 2108 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2552 2108 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2552 2108 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2552 2108 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2552 2108 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2552 2108 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2552 2108 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2552 2108 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 30 PID 2108 wrote to memory of 2552 2108 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 30 PID 2552 wrote to memory of 1592 2552 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 31 PID 2552 wrote to memory of 1592 2552 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 31 PID 2552 wrote to memory of 1592 2552 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 31 PID 2552 wrote to memory of 1592 2552 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 31 PID 2552 wrote to memory of 2348 2552 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 32 PID 2552 wrote to memory of 2348 2552 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 32 PID 2552 wrote to memory of 2348 2552 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 32 PID 2552 wrote to memory of 2348 2552 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 32 PID 2552 wrote to memory of 2448 2552 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 34 PID 2552 wrote to memory of 2448 2552 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 34 PID 2552 wrote to memory of 2448 2552 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 34 PID 2552 wrote to memory of 2448 2552 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 34 PID 1592 wrote to memory of 2812 1592 cmd.exe 35 PID 1592 wrote to memory of 2812 1592 cmd.exe 35 PID 1592 wrote to memory of 2812 1592 cmd.exe 35 PID 1592 wrote to memory of 2812 1592 cmd.exe 35 PID 2812 wrote to memory of 2816 2812 net.exe 36 PID 2812 wrote to memory of 2816 2812 net.exe 36 PID 2812 wrote to memory of 2816 2812 net.exe 36 PID 2812 wrote to memory of 2816 2812 net.exe 36 PID 2448 wrote to memory of 2840 2448 mshost.exe 37 PID 2448 wrote to memory of 2840 2448 mshost.exe 37 PID 2448 wrote to memory of 2840 2448 mshost.exe 37 PID 2448 wrote to memory of 2840 2448 mshost.exe 37 PID 2448 wrote to memory of 2840 2448 mshost.exe 37 PID 2448 wrote to memory of 2840 2448 mshost.exe 37 PID 2448 wrote to memory of 2840 2448 mshost.exe 37 PID 2448 wrote to memory of 2840 2448 mshost.exe 37 PID 2448 wrote to memory of 2840 2448 mshost.exe 37 PID 2840 wrote to memory of 2628 2840 mshost.exe 38 PID 2840 wrote to memory of 2628 2840 mshost.exe 38 PID 2840 wrote to memory of 2628 2840 mshost.exe 38 PID 2840 wrote to memory of 2628 2840 mshost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe2⤵
- Looks for VMWare Tools registry key
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\x.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram mshost.exe 1 ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Windows\mshost.exe"C:\Windows\mshost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\mshost.exeC:\Windows\mshost.exe4⤵
- Looks for VMWare Tools registry key
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram mshost.exe 1 ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2628
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143KB
MD5e1d83034bbf6a31c35bbcee0ecd0b491
SHA146b3b9f1ac677ba0daa2a7305fa7307c59cf985e
SHA256d50d551612f0d81c35677a0f2fe2ab16f78c5f2842948011d2b9bc387127b83c
SHA512f5860771564d2836af6250be4087fbd27f25506ed15871829c18dcb5021e990e4d59e8c99a3256e40e3e24a019d8d0e048a79d80edd511ad55bad9130b745141
-
Filesize
53B
MD5e6ed7be2b9572503f07663ca6e53759f
SHA17ad80bd38f2a27e06c111b551c76ad0a0585c194
SHA256b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9
SHA512e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227