Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 08:12
Static task
static1
Behavioral task
behavioral1
Sample
f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe
-
Size
128KB
-
MD5
f3176f5257ecdec0ddc8e6d581791686
-
SHA1
e1a73413ab9ac08449b6906d06f6741750f2b5cc
-
SHA256
d79451ddda0a795ae6bf7b1972dfb4642cf6225c8537c0f2de22f8fea66661ea
-
SHA512
8dcf1bb210be66d849cbf50c418592c1f303996294af75e593d2db4cc1be31486ed24e0189df46b6935998cc21faa614c2c8dd9693d25fe6c0c4557dc792987c
-
SSDEEP
1536:uqqppM+b/PjVsxmbClhlQruAlHIIgi/isC0YCt0Q7FjFRD2IDA/rWgyN3bF:u1TsxOUPQruYfR/isl50ClD2IEKJz
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\cwdrive32.exe" f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2800 cwdrive32.exe 2860 cwdrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\cwdrive32.exe" f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2336 set thread context of 2880 2336 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 29 PID 2800 set thread context of 2860 2800 cwdrive32.exe 31 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\%windir%\lfffile32.log cwdrive32.exe File created C:\Windows\cwdrive32.exe f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe File opened for modification C:\Windows\cwdrive32.exe f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cwdrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cwdrive32.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2880 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 2880 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2336 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 2800 cwdrive32.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2880 2336 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2880 2336 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2880 2336 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2880 2336 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2880 2336 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2880 2336 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2880 2336 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2880 2336 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2880 2336 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2880 2336 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2880 2336 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 29 PID 2336 wrote to memory of 2880 2336 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 29 PID 2880 wrote to memory of 2800 2880 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2800 2880 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2800 2880 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2800 2880 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2800 2880 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2800 2880 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 30 PID 2880 wrote to memory of 2800 2880 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 30 PID 2800 wrote to memory of 2860 2800 cwdrive32.exe 31 PID 2800 wrote to memory of 2860 2800 cwdrive32.exe 31 PID 2800 wrote to memory of 2860 2800 cwdrive32.exe 31 PID 2800 wrote to memory of 2860 2800 cwdrive32.exe 31 PID 2800 wrote to memory of 2860 2800 cwdrive32.exe 31 PID 2800 wrote to memory of 2860 2800 cwdrive32.exe 31 PID 2800 wrote to memory of 2860 2800 cwdrive32.exe 31 PID 2800 wrote to memory of 2860 2800 cwdrive32.exe 31 PID 2800 wrote to memory of 2860 2800 cwdrive32.exe 31 PID 2800 wrote to memory of 2860 2800 cwdrive32.exe 31 PID 2800 wrote to memory of 2860 2800 cwdrive32.exe 31 PID 2800 wrote to memory of 2860 2800 cwdrive32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\cwdrive32.exe"C:\Windows\cwdrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\cwdrive32.exe"C:\Windows\cwdrive32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5f3176f5257ecdec0ddc8e6d581791686
SHA1e1a73413ab9ac08449b6906d06f6741750f2b5cc
SHA256d79451ddda0a795ae6bf7b1972dfb4642cf6225c8537c0f2de22f8fea66661ea
SHA5128dcf1bb210be66d849cbf50c418592c1f303996294af75e593d2db4cc1be31486ed24e0189df46b6935998cc21faa614c2c8dd9693d25fe6c0c4557dc792987c