Analysis
-
max time kernel
105s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 19:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_967992e0e86863000b7850daac183ade.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_967992e0e86863000b7850daac183ade.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_967992e0e86863000b7850daac183ade.exe
-
Size
528KB
-
MD5
967992e0e86863000b7850daac183ade
-
SHA1
10671516a96eea8d8dc59e0ec494d38e3fb8012c
-
SHA256
54aea7ea709cca7deedfeb9df53746ac2a5a1e0a99ca4b12ff5bf5ff55aecd94
-
SHA512
93c3901fcbc21c08c4fbdc6ac7be78c02ce2f59cbf6142e14e40869f4a6bc90880abf558a2d6a750e84097113da9f2f7d89814cd9aa6a56dd42c3c7a302c5f58
-
SSDEEP
6144:e7CO/Eg5vsaLCp0kjOphMm9RHYYT/3T9mI8VsFu8HEw6jz1zNngR46:6COcaLCp0qOpvRH9L8p8HGZO
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" regedit.exe -
Modifies security service 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\crssc.exe JaffaCakes118_967992e0e86863000b7850daac183ade.exe File created C:\Windows\SysWOW64\crssc.exe JaffaCakes118_967992e0e86863000b7850daac183ade.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_967992e0e86863000b7850daac183ade.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\Software\Microsoft\Internet Explorer\International regedit.exe Set value (int) \REGISTRY\USER\S-1-5-21-446031748-3036493239-2009529691-1000\SOFTWARE\Microsoft\Internet Explorer\International\W2KLpk = "0" regedit.exe -
Runs .reg file with regedit 1 IoCs
pid Process 3676 regedit.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 1028 wrote to memory of 952 1028 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 84 PID 1028 wrote to memory of 952 1028 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 84 PID 1028 wrote to memory of 952 1028 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 84 PID 952 wrote to memory of 4004 952 cmd.exe 86 PID 952 wrote to memory of 4004 952 cmd.exe 86 PID 952 wrote to memory of 4004 952 cmd.exe 86 PID 4004 wrote to memory of 3952 4004 net.exe 87 PID 4004 wrote to memory of 3952 4004 net.exe 87 PID 4004 wrote to memory of 3952 4004 net.exe 87 PID 1028 wrote to memory of 4228 1028 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 91 PID 1028 wrote to memory of 4228 1028 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 91 PID 1028 wrote to memory of 4228 1028 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 91 PID 4228 wrote to memory of 3676 4228 cmd.exe 92 PID 4228 wrote to memory of 3676 4228 cmd.exe 92 PID 4228 wrote to memory of 3676 4228 cmd.exe 92 PID 1028 wrote to memory of 5232 1028 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 93 PID 1028 wrote to memory of 5232 1028 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 93 PID 1028 wrote to memory of 5232 1028 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 93 PID 1028 wrote to memory of 2900 1028 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 94 PID 1028 wrote to memory of 2900 1028 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 94 PID 1028 wrote to memory of 2900 1028 JaffaCakes118_967992e0e86863000b7850daac183ade.exe 94 PID 2900 wrote to memory of 4840 2900 cmd.exe 97 PID 2900 wrote to memory of 4840 2900 cmd.exe 97 PID 2900 wrote to memory of 4840 2900 cmd.exe 97 PID 5232 wrote to memory of 4804 5232 cmd.exe 98 PID 5232 wrote to memory of 4804 5232 cmd.exe 98 PID 5232 wrote to memory of 4804 5232 cmd.exe 98 PID 4804 wrote to memory of 4820 4804 net.exe 99 PID 4804 wrote to memory of 4820 4804 net.exe 99 PID 4804 wrote to memory of 4820 4804 net.exe 99 PID 4840 wrote to memory of 4832 4840 net.exe 100 PID 4840 wrote to memory of 4832 4840 net.exe 100 PID 4840 wrote to memory of 4832 4840 net.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_967992e0e86863000b7850daac183ade.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_967992e0e86863000b7850daac183ade.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\cmd.execmd /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4004 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:3952
-
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\sdfeww.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4228 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\7684d.reg3⤵
- Modifies firewall policy service
- Modifies security service
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Runs .reg file with regedit
PID:3676
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net stop "Security Center"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5232 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
PID:4820
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net start SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\net.exenet start SharedAccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4832
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
740B
MD5d7da32b54f3d538f34f39a720baa3710
SHA181ccbcb84583852ac1010bca1b38a86dc98a62e0
SHA256c55341eb198ee58b5ce91b6e64f986267b8d21dab994664358c12a522e9b8dab
SHA512c9720fcd9d4179411ed1bc5a28ab42b6885a5285901be131ca8efd79980497e54811922799957447b2296318abae974ebbf72b7e9d47c0648c896f60435a2610
-
Filesize
1KB
MD58ca96bd1f501b655b5bd70b375c78462
SHA130ccfda3a9b3f7d01ed169e98b2a634a4adc6e60
SHA25601a0db46e37426bf30e88f574079f9603565fe5e600867bfb3734caca81f6095
SHA5120eab28033612a65ae1bc0be4790db56125caa09853df50793ad4b9bd2cd648a56dd73b464da3f1c0da4782f4bf3ce413360170a003cf4112a3fae0b56eebb844