Analysis
-
max time kernel
104s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 19:40
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_955d65240e48706a349119925555fbc8.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_955d65240e48706a349119925555fbc8.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_955d65240e48706a349119925555fbc8.exe
-
Size
410KB
-
MD5
955d65240e48706a349119925555fbc8
-
SHA1
ba3eed67a20b0bd97b5aae3dcf93106f9ee0f108
-
SHA256
8d42055f4fd83eb93c26c92949b7ff63174e7d70658b362c4ac562713b95d07e
-
SHA512
fd9aa5e1fe4232e3e225768597cd7ef622187dc371bafddc272f459882674b3e9ecb529540c359b89058bcb2e50f99541132e3e9e85a928b23f5221b96054170
-
SSDEEP
12288:hfN2sDqTb56hY1i1H+hy/DvkNFe8wOlhsNJBNKLf:znYb56QiYKvkzPvsvY
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3732 set thread context of 2892 3732 JaffaCakes118_955d65240e48706a349119925555fbc8.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 1416 2892 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_955d65240e48706a349119925555fbc8.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3732 wrote to memory of 2892 3732 JaffaCakes118_955d65240e48706a349119925555fbc8.exe 88 PID 3732 wrote to memory of 2892 3732 JaffaCakes118_955d65240e48706a349119925555fbc8.exe 88 PID 3732 wrote to memory of 2892 3732 JaffaCakes118_955d65240e48706a349119925555fbc8.exe 88 PID 3732 wrote to memory of 2892 3732 JaffaCakes118_955d65240e48706a349119925555fbc8.exe 88 PID 3732 wrote to memory of 2892 3732 JaffaCakes118_955d65240e48706a349119925555fbc8.exe 88 PID 3732 wrote to memory of 2892 3732 JaffaCakes118_955d65240e48706a349119925555fbc8.exe 88 PID 3732 wrote to memory of 2892 3732 JaffaCakes118_955d65240e48706a349119925555fbc8.exe 88 PID 3732 wrote to memory of 2892 3732 JaffaCakes118_955d65240e48706a349119925555fbc8.exe 88 PID 3732 wrote to memory of 2892 3732 JaffaCakes118_955d65240e48706a349119925555fbc8.exe 88 PID 3732 wrote to memory of 2892 3732 JaffaCakes118_955d65240e48706a349119925555fbc8.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_955d65240e48706a349119925555fbc8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_955d65240e48706a349119925555fbc8.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_955d65240e48706a349119925555fbc8.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_955d65240e48706a349119925555fbc8.exe"2⤵PID:2892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 123⤵
- Program crash
PID:1416
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2892 -ip 28921⤵PID:3716