Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 14:34
Static task
static1
Behavioral task
behavioral1
Sample
fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe
-
Size
212KB
-
MD5
fbecfcdcecb37890c0dfee2153e02c07
-
SHA1
c5084216b1903c0ba876dc7c7becff0738ed1457
-
SHA256
88dc07e6f9603f35cff1dad0a3d20d514064c5b5fb3edd1abcc16929e0d63902
-
SHA512
d5b38302cdc326bbd1cab006c471def2ebb6e6ba167f719a4bf188296e955a4dbf8fea7c50c5a771ff2486a3d35be74eaf7c5dbc4bf314698fd8e2948fd5d58f
-
SSDEEP
3072:RWaNLnxKF4AzEsw+DEchlvdxdeTBQnU96dpBIAnli3mF:RW8UhwDcTvdxoKUUdNn42F
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\MicrosoftCorp = "C:\\WINDOWS\\system32\\traymgr.exe" fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 3180 traymgr.exe 1660 traymgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\MicrosoftNAPC = "C:\\WINDOWS\\system32\\traymgr.exe" fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 traymgr.exe File opened for modification \??\PhysicalDrive0 fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\traymgr.exe fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\traymgr.exe fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe File opened for modification C:\WINDOWS\SysWOW64\traymgr.exe traymgr.exe File created C:\WINDOWS\SysWOW64\traymgr.exe traymgr.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2788 set thread context of 3548 2788 fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe 83 PID 3180 set thread context of 1660 3180 traymgr.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language traymgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language traymgr.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2788 fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe 3180 traymgr.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2788 wrote to memory of 3548 2788 fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe 83 PID 2788 wrote to memory of 3548 2788 fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe 83 PID 2788 wrote to memory of 3548 2788 fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe 83 PID 2788 wrote to memory of 3548 2788 fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe 83 PID 2788 wrote to memory of 3548 2788 fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe 83 PID 2788 wrote to memory of 3548 2788 fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe 83 PID 2788 wrote to memory of 3548 2788 fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe 83 PID 2788 wrote to memory of 3548 2788 fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe 83 PID 3548 wrote to memory of 3180 3548 fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe 84 PID 3548 wrote to memory of 3180 3548 fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe 84 PID 3548 wrote to memory of 3180 3548 fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe 84 PID 3180 wrote to memory of 1660 3180 traymgr.exe 85 PID 3180 wrote to memory of 1660 3180 traymgr.exe 85 PID 3180 wrote to memory of 1660 3180 traymgr.exe 85 PID 3180 wrote to memory of 1660 3180 traymgr.exe 85 PID 3180 wrote to memory of 1660 3180 traymgr.exe 85 PID 3180 wrote to memory of 1660 3180 traymgr.exe 85 PID 3180 wrote to memory of 1660 3180 traymgr.exe 85 PID 3180 wrote to memory of 1660 3180 traymgr.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fbecfcdcecb37890c0dfee2153e02c07_JaffaCakes118.exe" c:\users\admin\appdata\local\temp\Program.exeB2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\WINDOWS\SysWOW64\traymgr.exe"C:\WINDOWS\system32\traymgr.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\WINDOWS\SysWOW64\traymgr.exe"C:\WINDOWS\SysWOW64\traymgr.exe" c:\users\admin\appdata\local\temp\Program.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1660
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5fbecfcdcecb37890c0dfee2153e02c07
SHA1c5084216b1903c0ba876dc7c7becff0738ed1457
SHA25688dc07e6f9603f35cff1dad0a3d20d514064c5b5fb3edd1abcc16929e0d63902
SHA512d5b38302cdc326bbd1cab006c471def2ebb6e6ba167f719a4bf188296e955a4dbf8fea7c50c5a771ff2486a3d35be74eaf7c5dbc4bf314698fd8e2948fd5d58f