Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/03/2025, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_967992e0e86863000b7850daac183ade.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_967992e0e86863000b7850daac183ade.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_967992e0e86863000b7850daac183ade.exe
-
Size
528KB
-
MD5
967992e0e86863000b7850daac183ade
-
SHA1
10671516a96eea8d8dc59e0ec494d38e3fb8012c
-
SHA256
54aea7ea709cca7deedfeb9df53746ac2a5a1e0a99ca4b12ff5bf5ff55aecd94
-
SHA512
93c3901fcbc21c08c4fbdc6ac7be78c02ce2f59cbf6142e14e40869f4a6bc90880abf558a2d6a750e84097113da9f2f7d89814cd9aa6a56dd42c3c7a302c5f58
-
SSDEEP
6144:e7CO/Eg5vsaLCp0kjOphMm9RHYYT/3T9mI8VsFu8HEw6jz1zNngR46:6COcaLCp0qOpvRH9L8p8HGZO
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" regedit.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\crssc.exe JaffaCakes118_967992e0e86863000b7850daac183ade.exe File opened for modification C:\Windows\SysWOW64\crssc.exe JaffaCakes118_967992e0e86863000b7850daac183ade.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_967992e0e86863000b7850daac183ade.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Internet Explorer\International\W2KLpk = "0" regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 2912 regedit.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 3068 wrote to memory of 3036 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 28 PID 3068 wrote to memory of 3036 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 28 PID 3068 wrote to memory of 3036 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 28 PID 3068 wrote to memory of 3036 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 28 PID 3036 wrote to memory of 2672 3036 cmd.exe 30 PID 3036 wrote to memory of 2672 3036 cmd.exe 30 PID 3036 wrote to memory of 2672 3036 cmd.exe 30 PID 3036 wrote to memory of 2672 3036 cmd.exe 30 PID 2672 wrote to memory of 2688 2672 net.exe 31 PID 2672 wrote to memory of 2688 2672 net.exe 31 PID 2672 wrote to memory of 2688 2672 net.exe 31 PID 2672 wrote to memory of 2688 2672 net.exe 31 PID 3068 wrote to memory of 2616 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 32 PID 3068 wrote to memory of 2616 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 32 PID 3068 wrote to memory of 2616 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 32 PID 3068 wrote to memory of 2616 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 32 PID 2616 wrote to memory of 2912 2616 cmd.exe 33 PID 2616 wrote to memory of 2912 2616 cmd.exe 33 PID 2616 wrote to memory of 2912 2616 cmd.exe 33 PID 2616 wrote to memory of 2912 2616 cmd.exe 33 PID 3068 wrote to memory of 2596 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 34 PID 3068 wrote to memory of 2596 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 34 PID 3068 wrote to memory of 2596 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 34 PID 3068 wrote to memory of 2596 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 34 PID 3068 wrote to memory of 2652 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 35 PID 3068 wrote to memory of 2652 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 35 PID 3068 wrote to memory of 2652 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 35 PID 3068 wrote to memory of 2652 3068 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 35 PID 2596 wrote to memory of 2996 2596 cmd.exe 38 PID 2596 wrote to memory of 2996 2596 cmd.exe 38 PID 2596 wrote to memory of 2996 2596 cmd.exe 38 PID 2596 wrote to memory of 2996 2596 cmd.exe 38 PID 2652 wrote to memory of 2936 2652 cmd.exe 39 PID 2652 wrote to memory of 2936 2652 cmd.exe 39 PID 2652 wrote to memory of 2936 2652 cmd.exe 39 PID 2652 wrote to memory of 2936 2652 cmd.exe 39 PID 2996 wrote to memory of 2356 2996 net.exe 40 PID 2996 wrote to memory of 2356 2996 net.exe 40 PID 2996 wrote to memory of 2356 2996 net.exe 40 PID 2996 wrote to memory of 2356 2996 net.exe 40 PID 2936 wrote to memory of 2940 2936 net.exe 41 PID 2936 wrote to memory of 2940 2936 net.exe 41 PID 2936 wrote to memory of 2940 2936 net.exe 41 PID 2936 wrote to memory of 2940 2936 net.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_967992e0e86863000b7850daac183ade.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_967992e0e86863000b7850daac183ade.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:2688
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\sdfeww.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\7684d.reg3⤵
- Modifies firewall policy service
- Modifies security service
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Runs .reg file with regedit
PID:2912
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Security Center"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\net.exenet start SharedAccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
740B
MD5d7da32b54f3d538f34f39a720baa3710
SHA181ccbcb84583852ac1010bca1b38a86dc98a62e0
SHA256c55341eb198ee58b5ce91b6e64f986267b8d21dab994664358c12a522e9b8dab
SHA512c9720fcd9d4179411ed1bc5a28ab42b6885a5285901be131ca8efd79980497e54811922799957447b2296318abae974ebbf72b7e9d47c0648c896f60435a2610
-
Filesize
1KB
MD58ca96bd1f501b655b5bd70b375c78462
SHA130ccfda3a9b3f7d01ed169e98b2a634a4adc6e60
SHA25601a0db46e37426bf30e88f574079f9603565fe5e600867bfb3734caca81f6095
SHA5120eab28033612a65ae1bc0be4790db56125caa09853df50793ad4b9bd2cd648a56dd73b464da3f1c0da4782f4bf3ce413360170a003cf4112a3fae0b56eebb844