Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-12-2024 08:12
Static task
static1
Behavioral task
behavioral1
Sample
f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe
-
Size
128KB
-
MD5
f3176f5257ecdec0ddc8e6d581791686
-
SHA1
e1a73413ab9ac08449b6906d06f6741750f2b5cc
-
SHA256
d79451ddda0a795ae6bf7b1972dfb4642cf6225c8537c0f2de22f8fea66661ea
-
SHA512
8dcf1bb210be66d849cbf50c418592c1f303996294af75e593d2db4cc1be31486ed24e0189df46b6935998cc21faa614c2c8dd9693d25fe6c0c4557dc792987c
-
SSDEEP
1536:uqqppM+b/PjVsxmbClhlQruAlHIIgi/isC0YCt0Q7FjFRD2IDA/rWgyN3bF:u1TsxOUPQruYfR/isl50ClD2IEKJz
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\cwdrive32.exe" f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 1040 cwdrive32.exe 1624 cwdrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\cwdrive32.exe" f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4988 set thread context of 4920 4988 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 82 PID 1040 set thread context of 1624 1040 cwdrive32.exe 84 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\cwdrive32.exe f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe File opened for modification C:\Windows\cwdrive32.exe f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe File created C:\Windows\%windir%\lfffile32.log cwdrive32.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cwdrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cwdrive32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4920 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 4920 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 4920 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 4920 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4988 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 1040 cwdrive32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4988 wrote to memory of 4920 4988 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 82 PID 4988 wrote to memory of 4920 4988 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 82 PID 4988 wrote to memory of 4920 4988 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 82 PID 4988 wrote to memory of 4920 4988 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 82 PID 4988 wrote to memory of 4920 4988 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 82 PID 4988 wrote to memory of 4920 4988 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 82 PID 4988 wrote to memory of 4920 4988 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 82 PID 4988 wrote to memory of 4920 4988 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 82 PID 4920 wrote to memory of 1040 4920 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 83 PID 4920 wrote to memory of 1040 4920 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 83 PID 4920 wrote to memory of 1040 4920 f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe 83 PID 1040 wrote to memory of 1624 1040 cwdrive32.exe 84 PID 1040 wrote to memory of 1624 1040 cwdrive32.exe 84 PID 1040 wrote to memory of 1624 1040 cwdrive32.exe 84 PID 1040 wrote to memory of 1624 1040 cwdrive32.exe 84 PID 1040 wrote to memory of 1624 1040 cwdrive32.exe 84 PID 1040 wrote to memory of 1624 1040 cwdrive32.exe 84 PID 1040 wrote to memory of 1624 1040 cwdrive32.exe 84 PID 1040 wrote to memory of 1624 1040 cwdrive32.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3176f5257ecdec0ddc8e6d581791686_JaffaCakes118.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\cwdrive32.exe"C:\Windows\cwdrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\cwdrive32.exe"C:\Windows\cwdrive32.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1624
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5f3176f5257ecdec0ddc8e6d581791686
SHA1e1a73413ab9ac08449b6906d06f6741750f2b5cc
SHA256d79451ddda0a795ae6bf7b1972dfb4642cf6225c8537c0f2de22f8fea66661ea
SHA5128dcf1bb210be66d849cbf50c418592c1f303996294af75e593d2db4cc1be31486ed24e0189df46b6935998cc21faa614c2c8dd9693d25fe6c0c4557dc792987c