Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-12-2024 13:08
Static task
static1
Behavioral task
behavioral1
Sample
eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe
-
Size
256KB
-
MD5
eba66e4d7c9a936da58556851ce8a9fb
-
SHA1
8463e186457689ebe944e9a21b07270128907464
-
SHA256
803579bca6f45f5f1438cf1570ec5571d642e56af00e95620272f6d454809233
-
SHA512
df5dd5603656b65c674ec20bef5ef3e9836641db6021fd8a9fc6f6491ccbff95468622cb5d000a49f185e3e2a964dc0f896666d5ebc8290c8faeebca72171598
-
SSDEEP
3072:k/nouBtf7Gr6FspC8HaJ6tWWUzu5Su/e+RoGhGHWdOOjlNOC8u:kBb7Gr6OC8Ha0tZbbn
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List igfxpd64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile igfxpd64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications igfxpd64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxpd64.exe = "C:\\Windows\\SysWOW64\\igfxpd64.exe:*:Enabled:Intel Software Update" igfxpd64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List igfxpd64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile igfxpd64.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications igfxpd64.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxpd64.exe = "C:\\Windows\\SysWOW64\\igfxpd64.exe:*:Enabled:Intel Software Update" igfxpd64.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe -
Deletes itself 1 IoCs
pid Process 1280 igfxpd64.exe -
Executes dropped EXE 2 IoCs
pid Process 112 igfxpd64.exe 1280 igfxpd64.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Intel Software Update = "C:\\Windows\\SysWOW64\\igfxpd64.exe" igfxpd64.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpd64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpd64.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ igfxpd64.exe File opened for modification C:\Windows\SysWOW64\igfxpd64.exe igfxpd64.exe File opened for modification C:\Windows\SysWOW64\ eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxpd64.exe eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxpd64.exe eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4516 set thread context of 4084 4516 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 86 PID 112 set thread context of 1280 112 igfxpd64.exe 97 -
resource yara_rule behavioral2/memory/4084-0-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4084-2-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4084-4-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4084-3-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/4084-38-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1280-45-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1280-46-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1280-47-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1280-48-0x0000000000400000-0x0000000000466000-memory.dmp upx behavioral2/memory/1280-55-0x0000000000400000-0x0000000000466000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxpd64.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 4084 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 4084 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 4084 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 4084 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 1280 igfxpd64.exe 1280 igfxpd64.exe 1280 igfxpd64.exe 1280 igfxpd64.exe 1280 igfxpd64.exe 1280 igfxpd64.exe 1280 igfxpd64.exe 1280 igfxpd64.exe 1280 igfxpd64.exe 1280 igfxpd64.exe 1280 igfxpd64.exe 1280 igfxpd64.exe 1280 igfxpd64.exe 1280 igfxpd64.exe 1280 igfxpd64.exe 1280 igfxpd64.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 4516 wrote to memory of 4084 4516 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 86 PID 4516 wrote to memory of 4084 4516 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 86 PID 4516 wrote to memory of 4084 4516 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 86 PID 4516 wrote to memory of 4084 4516 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 86 PID 4516 wrote to memory of 4084 4516 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 86 PID 4516 wrote to memory of 4084 4516 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 86 PID 4516 wrote to memory of 4084 4516 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 86 PID 4516 wrote to memory of 4084 4516 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 86 PID 4084 wrote to memory of 112 4084 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 93 PID 4084 wrote to memory of 112 4084 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 93 PID 4084 wrote to memory of 112 4084 eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe 93 PID 112 wrote to memory of 1280 112 igfxpd64.exe 97 PID 112 wrote to memory of 1280 112 igfxpd64.exe 97 PID 112 wrote to memory of 1280 112 igfxpd64.exe 97 PID 112 wrote to memory of 1280 112 igfxpd64.exe 97 PID 112 wrote to memory of 1280 112 igfxpd64.exe 97 PID 112 wrote to memory of 1280 112 igfxpd64.exe 97 PID 112 wrote to memory of 1280 112 igfxpd64.exe 97 PID 112 wrote to memory of 1280 112 igfxpd64.exe 97 PID 1280 wrote to memory of 3528 1280 igfxpd64.exe 56 PID 1280 wrote to memory of 3528 1280 igfxpd64.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eba66e4d7c9a936da58556851ce8a9fb_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\igfxpd64.exe"C:\Windows\SysWOW64\igfxpd64.exe" C:\Users\Admin\AppData\Local\Temp\EBA66E~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\igfxpd64.exe"C:\Windows\SysWOW64\igfxpd64.exe" C:\Users\Admin\AppData\Local\Temp\EBA66E~1.EXE5⤵
- Modifies firewall policy service
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1280
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5eba66e4d7c9a936da58556851ce8a9fb
SHA18463e186457689ebe944e9a21b07270128907464
SHA256803579bca6f45f5f1438cf1570ec5571d642e56af00e95620272f6d454809233
SHA512df5dd5603656b65c674ec20bef5ef3e9836641db6021fd8a9fc6f6491ccbff95468622cb5d000a49f185e3e2a964dc0f896666d5ebc8290c8faeebca72171598