Analysis
-
max time kernel
143s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 19:46
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe
-
Size
148KB
-
MD5
95c163f785a9f6ce23cdcf7b0f2ffb9b
-
SHA1
a1be35b9c1b0172760e9363633e7c2a45b45f746
-
SHA256
0f9561ff51a6610732e2f62686d02c1cfa1e88ef00e0d7b9941002504fb0fa76
-
SHA512
f5f672a602d8c004f49f1fce3857e05601aa468613cceffded1beb0ee720698a0bc2191de747a6cbdca87320f63aed5cdd6c3da7bff63cc00b070913856dbbac
-
SSDEEP
3072:cbbUZWpNLDXduvcBj/yLJljbyoT5mlarMqkhxZproxSNBD:l0pJDXgv6glKarMrhxZprmS
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\wlcom.exe" JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe -
Executes dropped EXE 4 IoCs
pid Process 3832 wlcom.exe 212 wlcom.exe 1212 wlcom.exe 3116 wlcom.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\wlcom.exe" JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe -
Checks whether UAC is enabled 1 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wlcom.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wlcom.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2160 set thread context of 2604 2160 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 88 PID 3832 set thread context of 1212 3832 wlcom.exe 94 PID 212 set thread context of 3116 212 wlcom.exe 95 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\wlcom.exe JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe File opened for modification C:\Windows\wlcom.exe JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe File created C:\Windows\logfile32.txt wlcom.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlcom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlcom.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlcom.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2604 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 2604 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 2604 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 2604 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2604 2160 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 88 PID 2160 wrote to memory of 2604 2160 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 88 PID 2160 wrote to memory of 2604 2160 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 88 PID 2160 wrote to memory of 2604 2160 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 88 PID 2160 wrote to memory of 2604 2160 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 88 PID 2160 wrote to memory of 2604 2160 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 88 PID 2160 wrote to memory of 2604 2160 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 88 PID 2160 wrote to memory of 2604 2160 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 88 PID 2160 wrote to memory of 2604 2160 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 88 PID 2160 wrote to memory of 2604 2160 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 88 PID 2604 wrote to memory of 3832 2604 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 92 PID 2604 wrote to memory of 3832 2604 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 92 PID 2604 wrote to memory of 3832 2604 JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe 92 PID 3400 wrote to memory of 212 3400 cmd.exe 93 PID 3400 wrote to memory of 212 3400 cmd.exe 93 PID 3400 wrote to memory of 212 3400 cmd.exe 93 PID 3832 wrote to memory of 1212 3832 wlcom.exe 94 PID 3832 wrote to memory of 1212 3832 wlcom.exe 94 PID 3832 wrote to memory of 1212 3832 wlcom.exe 94 PID 3832 wrote to memory of 1212 3832 wlcom.exe 94 PID 3832 wrote to memory of 1212 3832 wlcom.exe 94 PID 3832 wrote to memory of 1212 3832 wlcom.exe 94 PID 3832 wrote to memory of 1212 3832 wlcom.exe 94 PID 3832 wrote to memory of 1212 3832 wlcom.exe 94 PID 3832 wrote to memory of 1212 3832 wlcom.exe 94 PID 3832 wrote to memory of 1212 3832 wlcom.exe 94 PID 212 wrote to memory of 3116 212 wlcom.exe 95 PID 212 wrote to memory of 3116 212 wlcom.exe 95 PID 212 wrote to memory of 3116 212 wlcom.exe 95 PID 212 wrote to memory of 3116 212 wlcom.exe 95 PID 212 wrote to memory of 3116 212 wlcom.exe 95 PID 212 wrote to memory of 3116 212 wlcom.exe 95 PID 212 wrote to memory of 3116 212 wlcom.exe 95 PID 212 wrote to memory of 3116 212 wlcom.exe 95 PID 212 wrote to memory of 3116 212 wlcom.exe 95 PID 212 wrote to memory of 3116 212 wlcom.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe"1⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_95c163f785a9f6ce23cdcf7b0f2ffb9b.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\wlcom.exe"C:\Windows\wlcom.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3832 -
C:\Windows\wlcom.exe"C:\Windows\wlcom.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1212
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\wlcom.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\wlcom.exeC:\Windows\wlcom.exe2⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\wlcom.exeC:\Windows\wlcom.exe3⤵
- Executes dropped EXE
PID:3116
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148KB
MD595c163f785a9f6ce23cdcf7b0f2ffb9b
SHA1a1be35b9c1b0172760e9363633e7c2a45b45f746
SHA2560f9561ff51a6610732e2f62686d02c1cfa1e88ef00e0d7b9941002504fb0fa76
SHA512f5f672a602d8c004f49f1fce3857e05601aa468613cceffded1beb0ee720698a0bc2191de747a6cbdca87320f63aed5cdd6c3da7bff63cc00b070913856dbbac