Analysis

  • max time kernel
    129s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    16-12-2024 02:41

General

  • Target

    f6edfd7d41a37424ed76f18369251e52_JaffaCakes118.exe

  • Size

    145KB

  • MD5

    f6edfd7d41a37424ed76f18369251e52

  • SHA1

    8b76be608cc04b9c5d3cc96647c5147c8e3db220

  • SHA256

    c55ad3b4d5d5791710bd6c7f311ab03673f372c69b7fc623fc0976d7d2740fd4

  • SHA512

    ed3e8a0fcf4b7018e369fec57a357877e67938bbf0cf62d30e931262f6d964f9f3137f2ccc093f41a6a52976c90f640c9b626a814022fedab8e83477887b3918

  • SSDEEP

    3072:JKor0NTdzvhsC2WIQ80FmnT20KHPy06oGZbSfxwQdeWkDJv4BAkpQsyIQnjQcCzf:nQNNvh980FmT2jK0YZbixwQdeWktAOkP

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Modifies firewall policy service 3 TTPs 8 IoCs
  • Windows security bypass 2 TTPs 4 IoCs
  • Modifies Windows Firewall 2 TTPs 7 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Windows security modification 2 TTPs 4 IoCs
  • Drops file in System32 directory 1 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 21 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f6edfd7d41a37424ed76f18369251e52_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f6edfd7d41a37424ed76f18369251e52_JaffaCakes118.exe"
    1⤵
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    PID:2328
  • C:\Windows\Fonts\unwise_.exe
    "C:\Windows\Fonts\unwise_.exe"
    1⤵
    • Modifies firewall policy service
    • Windows security bypass
    • Deletes itself
    • Executes dropped EXE
    • Windows security modification
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1560
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" firewall set portopening TCP 445 NB
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      PID:2104
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" firewall set portopening TCP 139 NB
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      PID:2672
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" firewall set portopening TCP 1013 BS
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      PID:2812
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" firewall set portopening TCP 9999 PORT1
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      PID:2684
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" firewall set portopening TCP 9991 PORT2
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      PID:2920
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" firewall add allowedprogram "C:\Windows\Fonts\unwise_.exe" workstation ENABLE ALL
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      PID:2844
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\System32\netsh.exe" firewall set allowedprogram "C:\Windows\Fonts\unwise_.exe" workstation ENABLE ALL
      2⤵
      • Modifies Windows Firewall
      • Event Triggered Execution: Netsh Helper DLL
      • System Location Discovery: System Language Discovery
      • Modifies data under HKEY_USERS
      PID:2876

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\Fonts\unwise_.exe

    Filesize

    145KB

    MD5

    f6edfd7d41a37424ed76f18369251e52

    SHA1

    8b76be608cc04b9c5d3cc96647c5147c8e3db220

    SHA256

    c55ad3b4d5d5791710bd6c7f311ab03673f372c69b7fc623fc0976d7d2740fd4

    SHA512

    ed3e8a0fcf4b7018e369fec57a357877e67938bbf0cf62d30e931262f6d964f9f3137f2ccc093f41a6a52976c90f640c9b626a814022fedab8e83477887b3918

  • memory/1560-6-0x0000000000400000-0x00000000006A4836-memory.dmp

    Filesize

    2.6MB

  • memory/1560-7-0x0000000000400000-0x00000000006A4836-memory.dmp

    Filesize

    2.6MB

  • memory/1560-8-0x0000000000400000-0x00000000006A4836-memory.dmp

    Filesize

    2.6MB

  • memory/1560-11-0x0000000000400000-0x00000000006A4836-memory.dmp

    Filesize

    2.6MB

  • memory/1560-12-0x0000000000400000-0x00000000006A4836-memory.dmp

    Filesize

    2.6MB

  • memory/2328-0-0x0000000000400000-0x00000000006A4836-memory.dmp

    Filesize

    2.6MB

  • memory/2328-1-0x0000000000020000-0x0000000000022000-memory.dmp

    Filesize

    8KB

  • memory/2328-2-0x0000000000401000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2328-9-0x0000000000401000-0x000000000067C000-memory.dmp

    Filesize

    2.5MB

  • memory/2328-10-0x0000000000400000-0x00000000006A4836-memory.dmp

    Filesize

    2.6MB