Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-01-2025 01:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe
-
Size
142KB
-
MD5
0139a7026e76e6abe3803ec2af9d3c32
-
SHA1
4a0b5f5a78e33e44845fc264a025575b3ecc313a
-
SHA256
dd12d2b96c255447445ce7a898b9c6b598a1d19c06efd4d48d85fbe48344343a
-
SHA512
6b74f9061ff4f523611c2f64f65364bdfff7553ee77d3948dd999a2fc91a5480c6a54320748408da3c073d3417393b8e990e03181a5cbddc889eaad53913e8b1
-
SSDEEP
3072:D5hcEnHi4Zn7MWAxNIm1EJHiU/q8hzWhaN6SpRQTgjcKA8mNata:vcqHie1m1EJHW8ViaLRXN+ga
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 1 IoCs
pid Process 2740 igmyhc.exe -
Loads dropped DLL 2 IoCs
pid Process 1956 JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe 1956 JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\igmyhc.exe JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe File opened for modification C:\Windows\SysWOW64\igmyhc.exe JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2192 set thread context of 1956 2192 JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2192 wrote to memory of 1956 2192 JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe 30 PID 2192 wrote to memory of 1956 2192 JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe 30 PID 2192 wrote to memory of 1956 2192 JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe 30 PID 2192 wrote to memory of 1956 2192 JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe 30 PID 2192 wrote to memory of 1956 2192 JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe 30 PID 2192 wrote to memory of 1956 2192 JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe 30 PID 1956 wrote to memory of 2740 1956 JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe 31 PID 1956 wrote to memory of 2740 1956 JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe 31 PID 1956 wrote to memory of 2740 1956 JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe 31 PID 1956 wrote to memory of 2740 1956 JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\igmyhc.exeC:\Windows\system32\igmyhc.exe 456 "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0139a7026e76e6abe3803ec2af9d3c32.exe"3⤵
- Executes dropped EXE
PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
142KB
MD50139a7026e76e6abe3803ec2af9d3c32
SHA14a0b5f5a78e33e44845fc264a025575b3ecc313a
SHA256dd12d2b96c255447445ce7a898b9c6b598a1d19c06efd4d48d85fbe48344343a
SHA5126b74f9061ff4f523611c2f64f65364bdfff7553ee77d3948dd999a2fc91a5480c6a54320748408da3c073d3417393b8e990e03181a5cbddc889eaad53913e8b1