Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 14:18
Behavioral task
behavioral1
Sample
e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe
-
Size
143KB
-
MD5
e1d83034bbf6a31c35bbcee0ecd0b491
-
SHA1
46b3b9f1ac677ba0daa2a7305fa7307c59cf985e
-
SHA256
d50d551612f0d81c35677a0f2fe2ab16f78c5f2842948011d2b9bc387127b83c
-
SHA512
f5860771564d2836af6250be4087fbd27f25506ed15871829c18dcb5021e990e4d59e8c99a3256e40e3e24a019d8d0e048a79d80edd511ad55bad9130b745141
-
SSDEEP
1536:3wwpWESzX4dia8O99dSuwrCq7StPoPAWgUIYFMSiU7a4+dwvEsyGpaDVGcc3s/b:gfBr4ogHIzuYFnB7a4+a8syGp7V3sT
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools mshost.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 4484 netsh.exe 2104 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation mshost.exe -
Deletes itself 1 IoCs
pid Process 3148 mshost.exe -
Executes dropped EXE 2 IoCs
pid Process 3720 mshost.exe 3148 mshost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mshost = "C:\\Windows\\mshost.exe" e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4180 set thread context of 3288 4180 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 84 PID 3720 set thread context of 3148 3720 mshost.exe 89 -
resource yara_rule behavioral2/memory/4180-0-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral2/memory/4180-7-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral2/files/0x000d000000023a68-16.dat upx behavioral2/memory/3720-24-0x0000000000400000-0x000000000042C000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\winmx\shared\Virus Maker.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\Adobe Photoshop CS4 KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Limewire Pro Downloader.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\AOL Hacker 2008.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Password Cracker.exe mshost.exe File created C:\Program Files (x86)\tesla\files\RuneScape 2008 - Newest Exploits.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Kaspersky Keygen.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\YIM HAcker 2008.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\DivX Pro KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\YIM HAcker 2008.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\Nod32 Crack.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Windows XP Keygen mshost.exe File created C:\Program Files (x86)\emule\incoming\Limewire Pro Downloader.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Windows 2008 Server KeyGen.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Myspace Bruteforce.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\Nod32 Crack.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\MSN Hacker 2009.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Adobe Keygen.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\YIM HAcker 2008.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\AOL Password Cracker.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\Nod32 Keygen.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\Microsoft Visual Studio 6 KeyGen.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\Microsoft Visual C++ 2008 KeyGen.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\RuneScape 2008 - Newest Exploits.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\Kaspersky 2009 Full Suite Crack.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Microsoft Visual Basic 2008 KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Myspace Cracker.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\Counter-Strike Source KeyGen.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\Photoshop Crack.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Kaspersky Keygen.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\MSN Live Password Cracker.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\Hotmail Cracker.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\Virus Generator.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\AOL Instant Messenger (AIM) Cracker.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\WOW Account Cracker.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\WOW Account Cracker.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Adobe Keygen.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\Adobe Photoshop CS3 Keygen.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\Myspace Attack.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\YIM HAcker 2008.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Adobe Photoshop CS4 KeyGen.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\PhotoShop Keygen.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\DeadSpace KeyGen.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Hotmail Cracker.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Widnows Vista Crack.exe mshost.exe File created C:\Program Files (x86)\tesla\files\Myspace Cracker.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\Microsoft Visual C++ 6 KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Norton Anti-Virus 2008 Enterprise Crack.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Adobe Photoshop Crack.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\Tcpip Patch.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\Adobe Photoshop Keygen.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\Adobe Photoshop Keygen.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\Half-Life 2 WORKS-ON-STEAM.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Counter-Strike KeyGen.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\AOL Hacker 2009.exe mshost.exe File created C:\Program Files (x86)\tesla\files\WOW Account Cracker.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\Steam Account Stealer.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Windows Vista Keygen mshost.exe File created C:\Program Files (x86)\icq\shared folder\Nod32 Crack.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Photoshop Crack.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\AOL Hacker 2009.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\Myspace Cracker.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\RuneScape 2008 - Newest Exploits.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\MSN Hacker 2008.exe mshost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\mshost.exe e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe File opened for modification C:\Windows\mshost.exe e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3288 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 3288 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 3288 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 3288 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe 3148 mshost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4180 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 3720 mshost.exe -
Suspicious use of WriteProcessMemory 37 IoCs
description pid Process procid_target PID 4180 wrote to memory of 3288 4180 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 84 PID 4180 wrote to memory of 3288 4180 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 84 PID 4180 wrote to memory of 3288 4180 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 84 PID 4180 wrote to memory of 3288 4180 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 84 PID 4180 wrote to memory of 3288 4180 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 84 PID 4180 wrote to memory of 3288 4180 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 84 PID 4180 wrote to memory of 3288 4180 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 84 PID 4180 wrote to memory of 3288 4180 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 84 PID 3288 wrote to memory of 4264 3288 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 85 PID 3288 wrote to memory of 4264 3288 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 85 PID 3288 wrote to memory of 4264 3288 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 85 PID 3288 wrote to memory of 4484 3288 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 86 PID 3288 wrote to memory of 4484 3288 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 86 PID 3288 wrote to memory of 4484 3288 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 86 PID 3288 wrote to memory of 3720 3288 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 88 PID 3288 wrote to memory of 3720 3288 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 88 PID 3288 wrote to memory of 3720 3288 e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe 88 PID 3720 wrote to memory of 3148 3720 mshost.exe 89 PID 3720 wrote to memory of 3148 3720 mshost.exe 89 PID 3720 wrote to memory of 3148 3720 mshost.exe 89 PID 3720 wrote to memory of 3148 3720 mshost.exe 89 PID 3720 wrote to memory of 3148 3720 mshost.exe 89 PID 3720 wrote to memory of 3148 3720 mshost.exe 89 PID 3720 wrote to memory of 3148 3720 mshost.exe 89 PID 3720 wrote to memory of 3148 3720 mshost.exe 89 PID 4264 wrote to memory of 2116 4264 cmd.exe 90 PID 4264 wrote to memory of 2116 4264 cmd.exe 90 PID 4264 wrote to memory of 2116 4264 cmd.exe 90 PID 2116 wrote to memory of 4212 2116 net.exe 91 PID 2116 wrote to memory of 4212 2116 net.exe 91 PID 2116 wrote to memory of 4212 2116 net.exe 91 PID 3148 wrote to memory of 3312 3148 mshost.exe 92 PID 3148 wrote to memory of 3312 3148 mshost.exe 92 PID 3148 wrote to memory of 3312 3148 mshost.exe 92 PID 3148 wrote to memory of 2104 3148 mshost.exe 93 PID 3148 wrote to memory of 2104 3148 mshost.exe 93 PID 3148 wrote to memory of 2104 3148 mshost.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e1d83034bbf6a31c35bbcee0ecd0b491_JaffaCakes118.exe2⤵
- Looks for VMWare Tools registry key
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\x.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:4212
-
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram mshost.exe 1 ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:4484
-
-
C:\Windows\mshost.exe"C:\Windows\mshost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\mshost.exeC:\Windows\mshost.exe4⤵
- Looks for VMWare Tools registry key
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\x.bat" "5⤵
- System Location Discovery: System Language Discovery
PID:3312
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram mshost.exe 1 ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2104
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
143KB
MD5e1d83034bbf6a31c35bbcee0ecd0b491
SHA146b3b9f1ac677ba0daa2a7305fa7307c59cf985e
SHA256d50d551612f0d81c35677a0f2fe2ab16f78c5f2842948011d2b9bc387127b83c
SHA512f5860771564d2836af6250be4087fbd27f25506ed15871829c18dcb5021e990e4d59e8c99a3256e40e3e24a019d8d0e048a79d80edd511ad55bad9130b745141
-
Filesize
53B
MD5e6ed7be2b9572503f07663ca6e53759f
SHA17ad80bd38f2a27e06c111b551c76ad0a0585c194
SHA256b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9
SHA512e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227