Analysis

  • max time kernel
    149s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250410-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/04/2025, 19:11

General

  • Target

    JaffaCakes118_b8b71b9def235363cf64ba1605e14e46.exe

  • Size

    250KB

  • MD5

    b8b71b9def235363cf64ba1605e14e46

  • SHA1

    7217d66f37eb1103623a42611ca188389063ce82

  • SHA256

    450ec5de5bbca56129025758c3536c915993912e7aebdc96f7db78a98cb4946d

  • SHA512

    5116bd160e45f293b7cf660b8441f5a63686b024f76cd1712ab017af750dfb6fde5699aacc7b0fafd6ff0e620179dfde7f360e9af518cdf297b0d79d2a785936

  • SSDEEP

    3072:C6Kz5Ipid7aERbmz87Qeb7o9kjszRUPRUAF5agmDz3Gpr6Y9dSs32FNB0cbOVGUt:3lpk3RbKheud6UDj0D/3aIl

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • Modifies firewall policy service 3 TTPs 8 IoCs
  • Checks computer location settings 2 TTPs 8 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Executes dropped EXE 16 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Maps connected drives based on registry 3 TTPs 18 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 9 IoCs
  • UPX packed file 18 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 25 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3560
      • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8b71b9def235363cf64ba1605e14e46.exe
        "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8b71b9def235363cf64ba1605e14e46.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4616
        • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8b71b9def235363cf64ba1605e14e46.exe
          "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b8b71b9def235363cf64ba1605e14e46.exe"
          3⤵
          • Checks computer location settings
          • Maps connected drives based on registry
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:1300
          • C:\Windows\SysWOW64\wmpbd64.exe
            "C:\Windows\SysWOW64\wmpbd64.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2680
            • C:\Windows\SysWOW64\wmpbd64.exe
              "C:\Windows\SysWOW64\wmpbd64.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE
              5⤵
              • Modifies firewall policy service
              • Deletes itself
              • Executes dropped EXE
              • Adds Run key to start application
              • Maps connected drives based on registry
              • Drops file in System32 directory
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:1920
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\wmpbd64.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:5344
        • C:\Windows\SysWOW64\wmpbd64.exe
          C:\Windows\SysWOW64\wmpbd64.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:5480
          • C:\Windows\SysWOW64\wmpbd64.exe
            C:\Windows\SysWOW64\wmpbd64.exe
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Maps connected drives based on registry
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4768
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\wmpbd64.exe > nul
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2788
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\wmpbd64.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2240
        • C:\Windows\SysWOW64\wmpbd64.exe
          C:\Windows\SysWOW64\wmpbd64.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:6088
          • C:\Windows\SysWOW64\wmpbd64.exe
            C:\Windows\SysWOW64\wmpbd64.exe
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Maps connected drives based on registry
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5152
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\wmpbd64.exe > nul
              5⤵
              • System Location Discovery: System Language Discovery
              PID:3488
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\wmpbd64.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3728
        • C:\Windows\SysWOW64\wmpbd64.exe
          C:\Windows\SysWOW64\wmpbd64.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2180
          • C:\Windows\SysWOW64\wmpbd64.exe
            C:\Windows\SysWOW64\wmpbd64.exe
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Maps connected drives based on registry
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:392
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\wmpbd64.exe > nul
              5⤵
              • System Location Discovery: System Language Discovery
              PID:916
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\wmpbd64.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2644
        • C:\Windows\SysWOW64\wmpbd64.exe
          C:\Windows\SysWOW64\wmpbd64.exe
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          PID:5108
          • C:\Windows\SysWOW64\wmpbd64.exe
            C:\Windows\SysWOW64\wmpbd64.exe
            4⤵
            • Checks computer location settings
            • Executes dropped EXE
            • Maps connected drives based on registry
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3968
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\wmpbd64.exe > nul
              5⤵
              • System Location Discovery: System Language Discovery
              PID:700
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\wmpbd64.exe
        2⤵
          PID:6016
          • C:\Windows\SysWOW64\wmpbd64.exe
            C:\Windows\SysWOW64\wmpbd64.exe
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            PID:4372
            • C:\Windows\SysWOW64\wmpbd64.exe
              C:\Windows\SysWOW64\wmpbd64.exe
              4⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Maps connected drives based on registry
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4364
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\wmpbd64.exe > nul
                5⤵
                • System Location Discovery: System Language Discovery
                PID:3792
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\wmpbd64.exe
          2⤵
            PID:2004
            • C:\Windows\SysWOW64\wmpbd64.exe
              C:\Windows\SysWOW64\wmpbd64.exe
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              PID:5368
              • C:\Windows\SysWOW64\wmpbd64.exe
                C:\Windows\SysWOW64\wmpbd64.exe
                4⤵
                • Checks computer location settings
                • Executes dropped EXE
                • Maps connected drives based on registry
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                PID:4376
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\wmpbd64.exe > nul
                  5⤵
                  • System Location Discovery: System Language Discovery
                  PID:4572
          • C:\Windows\system32\cmd.exe
            C:\Windows\system32\cmd.exe /c C:\Windows\SysWOW64\wmpbd64.exe
            2⤵
              PID:4880
              • C:\Windows\SysWOW64\wmpbd64.exe
                C:\Windows\SysWOW64\wmpbd64.exe
                3⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                PID:5280
                • C:\Windows\SysWOW64\wmpbd64.exe
                  C:\Windows\SysWOW64\wmpbd64.exe
                  4⤵
                  • Checks computer location settings
                  • Executes dropped EXE
                  • Maps connected drives based on registry
                  • System Location Discovery: System Language Discovery
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1420
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c del C:\Windows\SysWOW64\wmpbd64.exe > nul
                    5⤵
                    • System Location Discovery: System Language Discovery
                    PID:5128

          Network

          MITRE ATT&CK Enterprise v16

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Windows\SysWOW64\wmpbd64.exe

            Filesize

            250KB

            MD5

            b8b71b9def235363cf64ba1605e14e46

            SHA1

            7217d66f37eb1103623a42611ca188389063ce82

            SHA256

            450ec5de5bbca56129025758c3536c915993912e7aebdc96f7db78a98cb4946d

            SHA512

            5116bd160e45f293b7cf660b8441f5a63686b024f76cd1712ab017af750dfb6fde5699aacc7b0fafd6ff0e620179dfde7f360e9af518cdf297b0d79d2a785936

          • memory/392-80-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/1300-0-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/1300-3-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/1300-4-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/1300-38-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/1300-2-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/1420-114-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/1920-54-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/1920-46-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/1920-58-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/1920-73-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/1920-44-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/3968-88-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/4364-97-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/4376-105-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/4768-53-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/4768-57-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB

          • memory/5152-72-0x0000000000400000-0x0000000000461000-memory.dmp

            Filesize

            388KB