Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 19:37
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe
-
Size
89KB
-
MD5
95350b439ce2fdc5f438199ab6f6e866
-
SHA1
65d874e5d6ad7818c40d8be3fa706b83da718140
-
SHA256
321e2dd4eaefa96d785b77ea58066640e50d9d53f7a15e319a1a1cfba952e555
-
SHA512
a5fc11160f92433a0f3f5348fad65a8c038811cc6f595afbe6e7a502d5a18158a29239db3c820b7c9ff8b15cbed2529edeb18306ffd85359a94c8a6e37c5975f
-
SSDEEP
1536:OOpOWmH4UIbiV8EEhHX4VOykVf25lOjBXIhKhRGsqsQVSpvwE:VOnH4UIbiV8EGHX/fUluB4hKn9k2
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 6 IoCs
pid Process 4512 AdobeARMS.exe 1996 AdobeARMS.exe 5024 AdobeARMS.exe 2384 AdobeARMS.exe 4452 AdobeARMS.exe 960 AdobeARMS.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeARMS = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeARMS.exe" AdobeARMS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\patches = "1" JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe Set value (str) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\AdobeARMS = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeARMS.exe" JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeARMS = "\\AdobeARMS.exe" AdobeARMS.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3376 set thread context of 4772 3376 JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe 92 PID 4512 set thread context of 5024 4512 AdobeARMS.exe 105 PID 1996 set thread context of 2384 1996 AdobeARMS.exe 110 PID 4452 set thread context of 960 4452 AdobeARMS.exe 116 -
resource yara_rule behavioral2/memory/4772-1-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/4772-0-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/4772-6-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/4772-2-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/4772-9-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/4772-7-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/4772-8-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/4772-18-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/5024-28-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/5024-27-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/5024-30-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/5024-26-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/5024-25-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/2384-40-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/5024-53-0x0000000000400000-0x000000000048B000-memory.dmp upx behavioral2/memory/960-57-0x0000000000400000-0x000000000048B000-memory.dmp upx -
Program crash 4 IoCs
pid pid_target Process procid_target 1932 3376 WerFault.exe 85 3416 4512 WerFault.exe 96 5112 1996 WerFault.exe 100 896 4452 WerFault.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeARMS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeARMS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdobeARMS.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 3376 wrote to memory of 4772 3376 JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe 92 PID 3376 wrote to memory of 4772 3376 JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe 92 PID 3376 wrote to memory of 4772 3376 JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe 92 PID 3376 wrote to memory of 4772 3376 JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe 92 PID 3376 wrote to memory of 4772 3376 JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe 92 PID 3376 wrote to memory of 4772 3376 JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe 92 PID 3376 wrote to memory of 4772 3376 JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe 92 PID 3376 wrote to memory of 4772 3376 JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe 92 PID 4772 wrote to memory of 4512 4772 JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe 96 PID 4772 wrote to memory of 4512 4772 JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe 96 PID 4772 wrote to memory of 4512 4772 JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe 96 PID 4980 wrote to memory of 1996 4980 cmd.exe 100 PID 4980 wrote to memory of 1996 4980 cmd.exe 100 PID 4980 wrote to memory of 1996 4980 cmd.exe 100 PID 4512 wrote to memory of 5024 4512 AdobeARMS.exe 105 PID 4512 wrote to memory of 5024 4512 AdobeARMS.exe 105 PID 4512 wrote to memory of 5024 4512 AdobeARMS.exe 105 PID 4512 wrote to memory of 5024 4512 AdobeARMS.exe 105 PID 4512 wrote to memory of 5024 4512 AdobeARMS.exe 105 PID 4512 wrote to memory of 5024 4512 AdobeARMS.exe 105 PID 4512 wrote to memory of 5024 4512 AdobeARMS.exe 105 PID 4512 wrote to memory of 5024 4512 AdobeARMS.exe 105 PID 1996 wrote to memory of 2384 1996 AdobeARMS.exe 110 PID 1996 wrote to memory of 2384 1996 AdobeARMS.exe 110 PID 1996 wrote to memory of 2384 1996 AdobeARMS.exe 110 PID 1996 wrote to memory of 2384 1996 AdobeARMS.exe 110 PID 1996 wrote to memory of 2384 1996 AdobeARMS.exe 110 PID 1996 wrote to memory of 2384 1996 AdobeARMS.exe 110 PID 1996 wrote to memory of 2384 1996 AdobeARMS.exe 110 PID 1996 wrote to memory of 2384 1996 AdobeARMS.exe 110 PID 5228 wrote to memory of 4452 5228 cmd.exe 111 PID 5228 wrote to memory of 4452 5228 cmd.exe 111 PID 5228 wrote to memory of 4452 5228 cmd.exe 111 PID 4452 wrote to memory of 960 4452 AdobeARMS.exe 116 PID 4452 wrote to memory of 960 4452 AdobeARMS.exe 116 PID 4452 wrote to memory of 960 4452 AdobeARMS.exe 116 PID 4452 wrote to memory of 960 4452 AdobeARMS.exe 116 PID 4452 wrote to memory of 960 4452 AdobeARMS.exe 116 PID 4452 wrote to memory of 960 4452 AdobeARMS.exe 116 PID 4452 wrote to memory of 960 4452 AdobeARMS.exe 116 PID 4452 wrote to memory of 960 4452 AdobeARMS.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3376 -s 3762⤵
- Program crash
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe"2⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Roaming\AdobeARMS.exeC:\Users\Admin\AppData\Roaming\AdobeARMS.exe 908 "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95350b439ce2fdc5f438199ab6f6e866.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4512 -s 3804⤵
- Program crash
PID:3416
-
-
C:\Users\Admin\AppData\Roaming\AdobeARMS.exe"C:\Users\Admin\AppData\Roaming\AdobeARMS.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:5024
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3376 -ip 33761⤵PID:4988
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 11⤵PID:4776
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\AdobeARMS.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Roaming\AdobeARMS.exeC:\Users\Admin\AppData\Roaming\AdobeARMS.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 3443⤵
- Program crash
PID:5112
-
-
C:\Users\Admin\AppData\Roaming\AdobeARMS.exe"C:\Users\Admin\AppData\Roaming\AdobeARMS.exe"3⤵
- Executes dropped EXE
PID:2384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 4512 -ip 45121⤵PID:1480
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1996 -ip 19961⤵PID:5052
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c \AdobeARMS.exe1⤵PID:116
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\AdobeARMS.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5228 -
C:\Users\Admin\AppData\Roaming\AdobeARMS.exeC:\Users\Admin\AppData\Roaming\AdobeARMS.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4452 -s 3483⤵
- Program crash
PID:896
-
-
C:\Users\Admin\AppData\Roaming\AdobeARMS.exe"C:\Users\Admin\AppData\Roaming\AdobeARMS.exe"3⤵
- Executes dropped EXE
PID:960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 492 -p 4452 -ip 44521⤵PID:3184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD595350b439ce2fdc5f438199ab6f6e866
SHA165d874e5d6ad7818c40d8be3fa706b83da718140
SHA256321e2dd4eaefa96d785b77ea58066640e50d9d53f7a15e319a1a1cfba952e555
SHA512a5fc11160f92433a0f3f5348fad65a8c038811cc6f595afbe6e7a502d5a18158a29239db3c820b7c9ff8b15cbed2529edeb18306ffd85359a94c8a6e37c5975f