Analysis
-
max time kernel
142s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe
-
Size
72KB
-
MD5
9705355b04bbddd4bf58861654cea033
-
SHA1
7ef470f76bce54fc9077458980de1b4daf46afec
-
SHA256
2877b00a91b084f505130b2bd3acffa6fb1793e25a5344603b69164b89cbb8d2
-
SHA512
91ff1dabc96b234d052d5e93e9bf965bfd4598207bec8a74f780deafc443366b6455a373ff3df2c0e82dbc808b7bde315c5ccf916c229f9c3c66cd2b3d9cb89b
-
SSDEEP
1536:8JDk2kAB6s0D1NVQdHUnl5LPkXdl6WKCTVeOZzsbAFREqOE:sCo6zDVEHiYdlMCTVe6oAOE
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation smgr.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation smgr.exe -
Executes dropped EXE 4 IoCs
pid Process 4872 smgr.exe 4688 smgr.exe 2852 smgr.exe 4724 smgr.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Data Serivce = "smgr.exe" JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1872 set thread context of 1388 1872 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 89 PID 4872 set thread context of 2852 4872 smgr.exe 99 PID 4688 set thread context of 4724 4688 smgr.exe 102 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\smgr.exe JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe File opened for modification C:\Windows\smgr.exe JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1872 wrote to memory of 1388 1872 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 89 PID 1872 wrote to memory of 1388 1872 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 89 PID 1872 wrote to memory of 1388 1872 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 89 PID 1872 wrote to memory of 1388 1872 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 89 PID 1872 wrote to memory of 1388 1872 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 89 PID 1872 wrote to memory of 1388 1872 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 89 PID 1872 wrote to memory of 1388 1872 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 89 PID 1872 wrote to memory of 1388 1872 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 89 PID 1872 wrote to memory of 1388 1872 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 89 PID 1388 wrote to memory of 1780 1388 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 90 PID 1388 wrote to memory of 1780 1388 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 90 PID 1388 wrote to memory of 1780 1388 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 90 PID 1388 wrote to memory of 4872 1388 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 94 PID 1388 wrote to memory of 4872 1388 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 94 PID 1388 wrote to memory of 4872 1388 JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe 94 PID 1780 wrote to memory of 4640 1780 cmd.exe 95 PID 1780 wrote to memory of 4640 1780 cmd.exe 95 PID 1780 wrote to memory of 4640 1780 cmd.exe 95 PID 4328 wrote to memory of 4688 4328 cmd.exe 96 PID 4328 wrote to memory of 4688 4328 cmd.exe 96 PID 4328 wrote to memory of 4688 4328 cmd.exe 96 PID 4640 wrote to memory of 4628 4640 net.exe 97 PID 4640 wrote to memory of 4628 4640 net.exe 97 PID 4640 wrote to memory of 4628 4640 net.exe 97 PID 4872 wrote to memory of 2852 4872 smgr.exe 99 PID 4872 wrote to memory of 2852 4872 smgr.exe 99 PID 4872 wrote to memory of 2852 4872 smgr.exe 99 PID 4872 wrote to memory of 2852 4872 smgr.exe 99 PID 4872 wrote to memory of 2852 4872 smgr.exe 99 PID 4872 wrote to memory of 2852 4872 smgr.exe 99 PID 4872 wrote to memory of 2852 4872 smgr.exe 99 PID 4872 wrote to memory of 2852 4872 smgr.exe 99 PID 4872 wrote to memory of 2852 4872 smgr.exe 99 PID 2852 wrote to memory of 2240 2852 smgr.exe 100 PID 2852 wrote to memory of 2240 2852 smgr.exe 100 PID 2852 wrote to memory of 2240 2852 smgr.exe 100 PID 4688 wrote to memory of 4724 4688 smgr.exe 102 PID 4688 wrote to memory of 4724 4688 smgr.exe 102 PID 4688 wrote to memory of 4724 4688 smgr.exe 102 PID 4688 wrote to memory of 4724 4688 smgr.exe 102 PID 4688 wrote to memory of 4724 4688 smgr.exe 102 PID 4688 wrote to memory of 4724 4688 smgr.exe 102 PID 4688 wrote to memory of 4724 4688 smgr.exe 102 PID 4688 wrote to memory of 4724 4688 smgr.exe 102 PID 4688 wrote to memory of 4724 4688 smgr.exe 102 PID 2240 wrote to memory of 4948 2240 cmd.exe 103 PID 2240 wrote to memory of 4948 2240 cmd.exe 103 PID 2240 wrote to memory of 4948 2240 cmd.exe 103 PID 4948 wrote to memory of 4740 4948 net.exe 104 PID 4948 wrote to memory of 4740 4948 net.exe 104 PID 4948 wrote to memory of 4740 4948 net.exe 104 PID 4724 wrote to memory of 2824 4724 smgr.exe 105 PID 4724 wrote to memory of 2824 4724 smgr.exe 105 PID 4724 wrote to memory of 2824 4724 smgr.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9705355b04bbddd4bf58861654cea033.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\x.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"5⤵
- System Location Discovery: System Language Discovery
PID:4628
-
-
-
-
C:\Windows\smgr.exe"C:\Windows\smgr.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\smgr.exe"C:\Windows\smgr.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\x.bat" "5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"7⤵
- System Location Discovery: System Language Discovery
PID:4740
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c smgr.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\smgr.exesmgr.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\smgr.exesmgr.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\x.bat" "4⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD59705355b04bbddd4bf58861654cea033
SHA17ef470f76bce54fc9077458980de1b4daf46afec
SHA2562877b00a91b084f505130b2bd3acffa6fb1793e25a5344603b69164b89cbb8d2
SHA51291ff1dabc96b234d052d5e93e9bf965bfd4598207bec8a74f780deafc443366b6455a373ff3df2c0e82dbc808b7bde315c5ccf916c229f9c3c66cd2b3d9cb89b
-
Filesize
53B
MD5e6ed7be2b9572503f07663ca6e53759f
SHA17ad80bd38f2a27e06c111b551c76ad0a0585c194
SHA256b1a6c027d18eb5766129a059f68201e6fb8c68d095f3932983009fe5ae2e4df9
SHA512e0010782b4fe567290536743375112db3107f8390d4c5cbb97f1bf1a8c83825399e1fe2fe9793d351896bb704f3bdec583fa7241b853b136fa9440a927d94227