Analysis

  • max time kernel
    148s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    18-12-2024 19:23

General

  • Target

    fcce7beefba9290e71f2d2c94940f176_JaffaCakes118.exe

  • Size

    453KB

  • MD5

    fcce7beefba9290e71f2d2c94940f176

  • SHA1

    f9723091885a6fc0c4c1dca94d5f83df60808a6d

  • SHA256

    f805110c117216794bff5fbeb53ec6905bcf0552e0e37f1afa1d0bf43b82f3c3

  • SHA512

    ac2c545ffb697f83cc92f47706aae89d553d07f7cd89792dfc60a5c0dd50462890a74ba2cb625a83ba7df97ff65a18ef38a2b2a83457c777269271783393909d

  • SSDEEP

    3072:394ZzO730avFydK04OLxzc2dvBlGJ4Cy6m3WvhZqIkBvvTAokmryNu0WpjjZe8YH:iyVFyc0FxQqVCZm3WnqIkdTVewRu+B18

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Executes dropped EXE 6 IoCs
  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Windows directory 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Runs net.exe
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fcce7beefba9290e71f2d2c94940f176_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fcce7beefba9290e71f2d2c94940f176_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\259448023.bat" "
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\SysWOW64\reg.exe
        REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Microsoft" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\service.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2168
    • C:\Users\Admin\AppData\Roaming\Microsoft\service.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:368
      • C:\Users\Admin\AppData\Roaming\Microsoft\service.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\service.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2232
        • C:\Users\Admin\AppData\Roaming\Microsoft\service.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2912
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\x.bat" "
            5⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:1532
            • C:\Windows\SysWOW64\net.exe
              net stop "Security Center"
              6⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1200
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop "Security Center"
                7⤵
                • System Location Discovery: System Language Discovery
                PID:2736
          • C:\Windows\services.exe
            "C:\Windows\services.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2192
            • C:\Windows\services.exe
              "C:\Windows\services.exe"
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Drops file in Windows directory
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1196
              • C:\Windows\services.exe
                7⤵
                • Executes dropped EXE
                • System Location Discovery: System Language Discovery
                PID:1948
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c ""C:\x.bat" "
                  8⤵
                  • System Location Discovery: System Language Discovery
                  PID:1488
                  • C:\Windows\SysWOW64\net.exe
                    net stop "Security Center"
                    9⤵
                    • System Location Discovery: System Language Discovery
                    PID:1992
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop "Security Center"
                      10⤵
                      • System Location Discovery: System Language Discovery
                      PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\259448023.bat

    Filesize

    146B

    MD5

    7eee65b102f30fd1ead48a8cd3b99827

    SHA1

    2f74a754019f280c6186c11531d460006814952e

    SHA256

    5748c60056db288b67e61148b339778816279e36907977f4fe03b5df04f6b57f

    SHA512

    a06de9e35ada579a95b2ba399e4c65b074d642788d456e10e0ae967896ac729c552f715261d9dc8c17fffca8d6b9144a6155ff11ab8569a82bdbd9d26109bd85

  • C:\x.bat

    Filesize

    53B

    MD5

    e6ed7be2b9572503f07663ca6e53759f

    SHA1

    7ad80bd38f2a27e06c111b551c76ad0a0585c194

    SHA256

    b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9

    SHA512

    e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227

  • \Users\Admin\AppData\Roaming\Microsoft\service.exe

    Filesize

    453KB

    MD5

    6b9993bb25ac35335c80feb706f1f28e

    SHA1

    bbca97fbad9eb7134b38aae6ff7eb8c6d93596eb

    SHA256

    068cc0c282d48041cf6b6ba33911dbb676f89fac03dda0fd28367b8ee3a46c69

    SHA512

    eb581150fdeb2a2f1b9e75e222a8d382ae408f41ad71c541b3a02a06ba82bcdf53003330128bde9bef868e8f3dc3efd1b3af70fcdc07fde7f9e29b35c93978ba

  • memory/1196-104-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/1948-124-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1948-123-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1948-120-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1948-117-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1948-115-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1948-106-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2232-38-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2232-61-0x0000000000400000-0x000000000040C000-memory.dmp

    Filesize

    48KB

  • memory/2912-62-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2912-48-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2912-84-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2912-46-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2912-50-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2912-52-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2912-56-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2912-63-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/2912-54-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2912-44-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB