Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18/12/2024, 07:57
Behavioral task
behavioral1
Sample
fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe
-
Size
93KB
-
MD5
fab6ba05e1cf011d57c17b703a69516c
-
SHA1
83116c49054c62f7ee9914695363c24880d12957
-
SHA256
0e36605a2523aeb76ee84d72a7eb5338b377dd6c5db997a3b627f4fa02263b6c
-
SHA512
837111b7f6345704ac80da07686be64548e687af4ca88baddaf7dd3d0241b164d0dc9cce643f709ff09569cdeb398e131cf541e6509d7c96b40cd61ab83ce2b8
-
SSDEEP
1536:AOY+p8XkkzzL14o5KnM6q/h3V7e8A+Nn0VJEojEKZM2l2nnJYEHaN1plCW5da9dJ:AfY8v4o0M6qTC8AWQDEKZynnd6NMga9X
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Looks for VMWare Tools registry key 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools mshost.exe -
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 3816 netsh.exe 5056 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation mshost.exe -
Deletes itself 1 IoCs
pid Process 3096 mshost.exe -
Executes dropped EXE 2 IoCs
pid Process 4276 mshost.exe 3096 mshost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mshost = "C:\\Windows\\mshost.exe" fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1136 set thread context of 4452 1136 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 83 PID 4276 set thread context of 3096 4276 mshost.exe 89 -
resource yara_rule behavioral2/memory/1136-0-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/memory/1136-7-0x0000000000400000-0x0000000000425000-memory.dmp upx behavioral2/files/0x000a000000023b8c-16.dat upx behavioral2/memory/4276-27-0x0000000000400000-0x0000000000425000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File created C:\Program Files (x86)\kazaa lite\my shared folder\Kaspersky Keygen.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\Myspace Bruteforce.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\RuneScape 2008 - Newest Exploits.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Counter-Strike KeyGen.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\RuneScape Cracker.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\ICQ Account Cracker.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\FTP Cracker.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Adobe Photoshop CS3 Keygen.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\ICQ Account Cracker.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Windows XP Keygen mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\AOL Triton Cracker.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\Myspace Cracker.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Hotmail Hacker.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\YIM HAcker 2009.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Windows XP Crack.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\MSN Live Password Cracker.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\Windows 2008 Server KeyGen.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Counter-Strike Source KeyGen.exe mshost.exe File created C:\Program Files (x86)\tesla\files\Adobe Photoshop Keygen.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\Hotmail Hacker.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Myspace Cracker.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Myspace Bruteforce.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\Tcpip Patch.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Norton Anti-Virus 2008 Enterprise Crack.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Widnows Vista Crack.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Norton Anti-Virus 2008 Enterprise Crack.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\AOL Hacker 2009.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Adobe Keygen.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\Kaspersky Keygen.exe mshost.exe File created C:\Program Files (x86)\tesla\files\Myspace Attack.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\RuneScape Gold Exploit.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\FTP Cracker.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Kaspersky Keygen.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\Hotmail Hacker.exe mshost.exe File created C:\Program Files (x86)\morpheus\my shared folder\Adobe Keygen.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\Adobe Photoshop CS4 KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\DeadSpace KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Adobe Photoshop CS4 KeyGen.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Windows XP Crack.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Tcpip Patch.exe mshost.exe File created C:\Program Files (x86)\icq\shared folder\Microsoft Visual Basic 2008 KeyGen.exe mshost.exe File created C:\Program Files (x86)\grokster\my grokster\Myspace Cracker.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\Kaspersky Keygen.exe mshost.exe File created C:\Program Files (x86)\limewire\shared\Microsoft Visual C++ 2008 KeyGen.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\Windows XP Keygen mshost.exe File created C:\Program Files (x86)\grokster\my grokster\Photoshop Crack.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Norton Anti-Virus 2008 Enterprise Crack.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\Half-Life 2 WORKS-ON-STEAM.exe mshost.exe File created C:\Program Files (x86)\tesla\files\Virus Maker.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\Norton Anti-Virus 2008 Enterprise Crack.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Windows Vista Keygen mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Nod32 Keygen.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\Password Cracker.exe mshost.exe File created C:\Program Files (x86)\bearshare\shared\Project 7 Private 4.8.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Microsoft Visual C++ 2008 KeyGen.exe mshost.exe File created C:\Program Files (x86)\emule\incoming\AOL Password Cracker.exe mshost.exe File created C:\Program Files (x86)\winmx\shared\Virus Maker.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Kaspersky 2009 Full Suite Crack.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Virus Generator.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\RuneScape 2008 - Newest Exploits.exe mshost.exe File created C:\Program Files (x86)\edonkey2000\incoming\Virus Generator.exe mshost.exe File created C:\Program Files (x86)\kazaa\my shared folder\AOL Instant Messenger (AIM) Cracker.exe mshost.exe File created C:\Program Files (x86)\kazaa lite\my shared folder\Hotmail Hacker.exe mshost.exe File created C:\Program Files (x86)\kazaa lite k++\my shared folder\MSN Live Password Cracker.exe mshost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\mshost.exe fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe File opened for modification C:\Windows\mshost.exe fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 6 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mshost.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe 3096 mshost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1136 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 4276 mshost.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 1136 wrote to memory of 4452 1136 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 83 PID 1136 wrote to memory of 4452 1136 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 83 PID 1136 wrote to memory of 4452 1136 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 83 PID 1136 wrote to memory of 4452 1136 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 83 PID 1136 wrote to memory of 4452 1136 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 83 PID 1136 wrote to memory of 4452 1136 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 83 PID 1136 wrote to memory of 4452 1136 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 83 PID 1136 wrote to memory of 4452 1136 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 83 PID 4452 wrote to memory of 2692 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 84 PID 4452 wrote to memory of 2692 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 84 PID 4452 wrote to memory of 2692 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 84 PID 4452 wrote to memory of 3816 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 85 PID 4452 wrote to memory of 3816 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 85 PID 4452 wrote to memory of 3816 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 85 PID 4452 wrote to memory of 4276 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 87 PID 4452 wrote to memory of 4276 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 87 PID 4452 wrote to memory of 4276 4452 fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe 87 PID 2692 wrote to memory of 2688 2692 cmd.exe 88 PID 2692 wrote to memory of 2688 2692 cmd.exe 88 PID 2692 wrote to memory of 2688 2692 cmd.exe 88 PID 4276 wrote to memory of 3096 4276 mshost.exe 89 PID 4276 wrote to memory of 3096 4276 mshost.exe 89 PID 4276 wrote to memory of 3096 4276 mshost.exe 89 PID 4276 wrote to memory of 3096 4276 mshost.exe 89 PID 4276 wrote to memory of 3096 4276 mshost.exe 89 PID 4276 wrote to memory of 3096 4276 mshost.exe 89 PID 4276 wrote to memory of 3096 4276 mshost.exe 89 PID 4276 wrote to memory of 3096 4276 mshost.exe 89 PID 2688 wrote to memory of 1104 2688 net.exe 90 PID 2688 wrote to memory of 1104 2688 net.exe 90 PID 2688 wrote to memory of 1104 2688 net.exe 90 PID 3096 wrote to memory of 5056 3096 mshost.exe 91 PID 3096 wrote to memory of 5056 3096 mshost.exe 91 PID 3096 wrote to memory of 5056 3096 mshost.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\fab6ba05e1cf011d57c17b703a69516c_JaffaCakes118.exe2⤵
- Looks for VMWare Tools registry key
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\x.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:1104
-
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram mshost.exe 1 ENABLE3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3816
-
-
C:\Windows\mshost.exe"C:\Windows\mshost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Windows\mshost.exeC:\Windows\mshost.exe4⤵
- Looks for VMWare Tools registry key
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\netsh.exenetsh firewall add allowedprogram mshost.exe 1 ENABLE5⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:5056
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD5fab6ba05e1cf011d57c17b703a69516c
SHA183116c49054c62f7ee9914695363c24880d12957
SHA2560e36605a2523aeb76ee84d72a7eb5338b377dd6c5db997a3b627f4fa02263b6c
SHA512837111b7f6345704ac80da07686be64548e687af4ca88baddaf7dd3d0241b164d0dc9cce643f709ff09569cdeb398e131cf541e6509d7c96b40cd61ab83ce2b8
-
Filesize
53B
MD5e6ed7be2b9572503f07663ca6e53759f
SHA17ad80bd38f2a27e06c111b551c76ad0a0585c194
SHA256b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9
SHA512e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227