Analysis
-
max time kernel
144s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 19:09
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe
Resource
win10v2004-20250410-en
General
-
Target
JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe
-
Size
65KB
-
MD5
b8b56401ea79643f428847bfe2be5b25
-
SHA1
1ead1f06ffdf21b7e1262255b85ada089ab715ea
-
SHA256
d12ee3db69b06b07f617cc7f32b4c14b54575cd9751bfbc2d8f4d667520f91e3
-
SHA512
f09c8d5c1ea8bf089bb33a3296fdfff5d99319628760f032f6e93fe414b385f0efd2fc2108c306c4aa33eb9bd1ca612e6494aad063721db8d26f4a6696d2a172
-
SSDEEP
1536:jFZ6qSjJMUzA4w+x57r98zbgSTDK6lKBnMX7FI/9Puo9U:GTJMUzJNq5GrBMRI/92om
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\cfdrive32.exe" JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe -
Executes dropped EXE 4 IoCs
pid Process 3344 cfdrive32.exe 4536 cfdrive32.exe 4464 cfdrive32.exe 4628 cfdrive32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\cfdrive32.exe" JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\%windir%\logfile32.log cfdrive32.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5496 set thread context of 6020 5496 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe 88 PID 3344 set thread context of 4628 3344 cfdrive32.exe 94 PID 4536 set thread context of 4464 4536 cfdrive32.exe 95 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\cfdrive32.exe JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe File opened for modification C:\Windows\cfdrive32.exe JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfdrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfdrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfdrive32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 6020 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe 6020 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe 6020 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe 6020 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 5496 wrote to memory of 6020 5496 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe 88 PID 5496 wrote to memory of 6020 5496 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe 88 PID 5496 wrote to memory of 6020 5496 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe 88 PID 5496 wrote to memory of 6020 5496 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe 88 PID 5496 wrote to memory of 6020 5496 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe 88 PID 5496 wrote to memory of 6020 5496 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe 88 PID 5496 wrote to memory of 6020 5496 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe 88 PID 6020 wrote to memory of 3344 6020 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe 91 PID 6020 wrote to memory of 3344 6020 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe 91 PID 6020 wrote to memory of 3344 6020 JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe 91 PID 2032 wrote to memory of 4536 2032 cmd.exe 92 PID 2032 wrote to memory of 4536 2032 cmd.exe 92 PID 2032 wrote to memory of 4536 2032 cmd.exe 92 PID 4536 wrote to memory of 4464 4536 cfdrive32.exe 95 PID 4536 wrote to memory of 4464 4536 cfdrive32.exe 95 PID 4536 wrote to memory of 4464 4536 cfdrive32.exe 95 PID 3344 wrote to memory of 4628 3344 cfdrive32.exe 94 PID 3344 wrote to memory of 4628 3344 cfdrive32.exe 94 PID 3344 wrote to memory of 4628 3344 cfdrive32.exe 94 PID 4536 wrote to memory of 4464 4536 cfdrive32.exe 95 PID 4536 wrote to memory of 4464 4536 cfdrive32.exe 95 PID 4536 wrote to memory of 4464 4536 cfdrive32.exe 95 PID 3344 wrote to memory of 4628 3344 cfdrive32.exe 94 PID 4536 wrote to memory of 4464 4536 cfdrive32.exe 95 PID 3344 wrote to memory of 4628 3344 cfdrive32.exe 94 PID 3344 wrote to memory of 4628 3344 cfdrive32.exe 94 PID 3344 wrote to memory of 4628 3344 cfdrive32.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5496 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8b56401ea79643f428847bfe2be5b25.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:6020 -
C:\Windows\cfdrive32.exe"C:\Windows\cfdrive32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Windows\cfdrive32.exe"C:\Windows\cfdrive32.exe"4⤵
- Executes dropped EXE
PID:4628
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\cfdrive32.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\cfdrive32.exeC:\Windows\cfdrive32.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\cfdrive32.exeC:\Windows\cfdrive32.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4464
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5b8b56401ea79643f428847bfe2be5b25
SHA11ead1f06ffdf21b7e1262255b85ada089ab715ea
SHA256d12ee3db69b06b07f617cc7f32b4c14b54575cd9751bfbc2d8f4d667520f91e3
SHA512f09c8d5c1ea8bf089bb33a3296fdfff5d99319628760f032f6e93fe414b385f0efd2fc2108c306c4aa33eb9bd1ca612e6494aad063721db8d26f4a6696d2a172