Analysis
-
max time kernel
140s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 23:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe
-
Size
200KB
-
MD5
b9118b806a01331e79510c2cf4089baf
-
SHA1
9b88da98a248532ccaca274dfa4a161129112296
-
SHA256
3da723c3cb2f46d23db56c303cd095ce3164520c0f3697cf74f5c42c1bc40957
-
SHA512
ff492dfcc3d1a9e5384f3cf6103674b3bb848425f6bc21414d8ec5683571e0323df935aebce0491df8b71b47fff883a7ae7b4cb750a1fc3c64b933b74e0ba952
-
SSDEEP
3072:whWrC9grnAoYlbxvikpfFa7i8Jip+U/HyFGRyYSG0aD/1uPp:wPmr9m9ikpfOiFp+U/SFG0YSG0kQ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications igfxht32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxht32.exe = "C:\\Windows\\SysWOW64\\igfxht32.exe:*:Enabled:Intel Helper Console" igfxht32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List igfxht32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile igfxht32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications igfxht32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxht32.exe = "C:\\Windows\\SysWOW64\\igfxht32.exe:*:Enabled:Intel Helper Console" igfxht32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List igfxht32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile igfxht32.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe Key value queried \REGISTRY\USER\S-1-5-21-3975168204-1612096350-4002976354-1000\Control Panel\International\Geo\Nation igfxht32.exe -
Deletes itself 1 IoCs
pid Process 4892 igfxht32.exe -
Executes dropped EXE 4 IoCs
pid Process 1720 igfxht32.exe 4892 igfxht32.exe 4336 igfxht32.exe 5604 igfxht32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Intel Helper Console = "C:\\Windows\\SysWOW64\\igfxht32.exe" igfxht32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Maps connected drives based on registry 3 TTPs 6 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxht32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxht32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxht32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxht32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe File opened for modification C:\Windows\SysWOW64\igfxht32.exe JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe File created C:\Windows\SysWOW64\igfxht32.exe JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe File opened for modification C:\Windows\SysWOW64\ igfxht32.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1824 set thread context of 400 1824 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 88 PID 1720 set thread context of 4892 1720 igfxht32.exe 96 PID 4336 set thread context of 5604 4336 igfxht32.exe 102 -
resource yara_rule behavioral1/memory/400-1-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/400-3-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/400-5-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/400-6-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/400-33-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/400-44-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/4892-48-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/4892-51-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/4892-50-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/4892-52-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/5604-59-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/4892-61-0x0000000000400000-0x0000000000451000-memory.dmp upx behavioral1/memory/5604-64-0x0000000000400000-0x0000000000451000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxht32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxht32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxht32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfxht32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 400 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 400 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 400 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 400 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 4892 igfxht32.exe 4892 igfxht32.exe 4892 igfxht32.exe 4892 igfxht32.exe 5604 igfxht32.exe 5604 igfxht32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 5604 igfxht32.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1824 wrote to memory of 400 1824 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 88 PID 1824 wrote to memory of 400 1824 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 88 PID 1824 wrote to memory of 400 1824 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 88 PID 1824 wrote to memory of 400 1824 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 88 PID 1824 wrote to memory of 400 1824 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 88 PID 1824 wrote to memory of 400 1824 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 88 PID 1824 wrote to memory of 400 1824 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 88 PID 400 wrote to memory of 1720 400 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 95 PID 400 wrote to memory of 1720 400 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 95 PID 400 wrote to memory of 1720 400 JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe 95 PID 1720 wrote to memory of 4892 1720 igfxht32.exe 96 PID 1720 wrote to memory of 4892 1720 igfxht32.exe 96 PID 1720 wrote to memory of 4892 1720 igfxht32.exe 96 PID 1720 wrote to memory of 4892 1720 igfxht32.exe 96 PID 1720 wrote to memory of 4892 1720 igfxht32.exe 96 PID 1720 wrote to memory of 4892 1720 igfxht32.exe 96 PID 1720 wrote to memory of 4892 1720 igfxht32.exe 96 PID 5836 wrote to memory of 4336 5836 cmd.exe 101 PID 5836 wrote to memory of 4336 5836 cmd.exe 101 PID 5836 wrote to memory of 4336 5836 cmd.exe 101 PID 4336 wrote to memory of 5604 4336 igfxht32.exe 102 PID 4336 wrote to memory of 5604 4336 igfxht32.exe 102 PID 4336 wrote to memory of 5604 4336 igfxht32.exe 102 PID 4336 wrote to memory of 5604 4336 igfxht32.exe 102 PID 4336 wrote to memory of 5604 4336 igfxht32.exe 102 PID 4336 wrote to memory of 5604 4336 igfxht32.exe 102 PID 4336 wrote to memory of 5604 4336 igfxht32.exe 102 PID 4892 wrote to memory of 3416 4892 igfxht32.exe 56 PID 4892 wrote to memory of 3416 4892 igfxht32.exe 56 PID 5604 wrote to memory of 5984 5604 igfxht32.exe 103 PID 5604 wrote to memory of 5984 5604 igfxht32.exe 103 PID 5604 wrote to memory of 5984 5604 igfxht32.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3416
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b9118b806a01331e79510c2cf4089baf.exe"3⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\SysWOW64\igfxht32.exe"C:\Windows\SysWOW64\igfxht32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\igfxht32.exe"C:\Windows\SysWOW64\igfxht32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE5⤵
- Modifies firewall policy service
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4892
-
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\igfxht32.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5836 -
C:\Windows\SysWOW64\igfxht32.exeC:\Windows\SysWOW64\igfxht32.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\igfxht32.exeC:\Windows\SysWOW64\igfxht32.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5604 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\igfxht32.exe > nul5⤵
- System Location Discovery: System Language Discovery
PID:5984
-
-
-
-
Network
MITRE ATT&CK Enterprise v16
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Indicator Removal
1File Deletion
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5b9118b806a01331e79510c2cf4089baf
SHA19b88da98a248532ccaca274dfa4a161129112296
SHA2563da723c3cb2f46d23db56c303cd095ce3164520c0f3697cf74f5c42c1bc40957
SHA512ff492dfcc3d1a9e5384f3cf6103674b3bb848425f6bc21414d8ec5683571e0323df935aebce0491df8b71b47fff883a7ae7b4cb750a1fc3c64b933b74e0ba952