Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
28-06-2024 05:49
Static task
static1
Behavioral task
behavioral1
Sample
19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe
-
Size
172KB
-
MD5
19032b4bb8b52eaa7957afa5a75d6e7d
-
SHA1
36887afafbdddcbb4166286806c858cae9f32f69
-
SHA256
937a06010a344cd0f304cafd344d1bf33aeb625980b815826c22ea7a4edb4fc8
-
SHA512
272fef9ab36a5f3515d24d9aa8079ecfeccb3cab4408311e9a3ac43806e5fdc72683a73d3f3e91e537c04bde0b11b37667eba197d114ba55f6127c6ade48faf0
-
SSDEEP
3072:l9USge4zN2C+yQI4lknPNKrxMzJ1SZSAHXBABqXSCORpEt6pAWFBCyo:lCte4zNiyQanPoE2hBAASCUWgpA5N
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 3 TTPs 4 IoCs
Processes:
wmpnt32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmpnt32.exe = "C:\\Windows\\SysWOW64\\wmpnt32.exe:*:Enabled:WinMedia Workstation" wmpnt32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List wmpnt32.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\wmpnt32.exe = "C:\\Windows\\SysWOW64\\wmpnt32.exe:*:Enabled:WinMedia Workstation" wmpnt32.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List wmpnt32.exe -
Deletes itself 1 IoCs
Processes:
wmpnt32.exepid process 2664 wmpnt32.exe -
Executes dropped EXE 2 IoCs
Processes:
wmpnt32.exewmpnt32.exepid process 2984 wmpnt32.exe 2664 wmpnt32.exe -
Loads dropped DLL 3 IoCs
Processes:
19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exewmpnt32.exepid process 2020 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe 2020 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe 2984 wmpnt32.exe -
Processes:
resource yara_rule behavioral1/memory/2020-5-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2020-10-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2020-13-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2020-12-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2020-11-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2020-3-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2020-7-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2664-41-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2020-44-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2664-45-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral1/memory/2664-49-0x0000000000400000-0x000000000044C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
wmpnt32.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinMedia Workstation = "C:\\Windows\\SysWOW64\\wmpnt32.exe" wmpnt32.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exewmpnt32.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpnt32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 wmpnt32.exe -
Drops file in System32 directory 4 IoCs
Processes:
19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exewmpnt32.exedescription ioc process File opened for modification C:\Windows\SysWOW64\wmpnt32.exe 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe File created C:\Windows\SysWOW64\wmpnt32.exe 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ wmpnt32.exe File opened for modification C:\Windows\SysWOW64\ 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exewmpnt32.exedescription pid process target process PID 2308 set thread context of 2020 2308 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe PID 2984 set thread context of 2664 2984 wmpnt32.exe wmpnt32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exewmpnt32.exepid process 2020 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe 2020 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe 2664 wmpnt32.exe 2664 wmpnt32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exewmpnt32.exewmpnt32.exedescription pid process target process PID 2308 wrote to memory of 2020 2308 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe PID 2308 wrote to memory of 2020 2308 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe PID 2308 wrote to memory of 2020 2308 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe PID 2308 wrote to memory of 2020 2308 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe PID 2308 wrote to memory of 2020 2308 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe PID 2308 wrote to memory of 2020 2308 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe PID 2308 wrote to memory of 2020 2308 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe PID 2020 wrote to memory of 2984 2020 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe wmpnt32.exe PID 2020 wrote to memory of 2984 2020 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe wmpnt32.exe PID 2020 wrote to memory of 2984 2020 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe wmpnt32.exe PID 2020 wrote to memory of 2984 2020 19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe wmpnt32.exe PID 2984 wrote to memory of 2664 2984 wmpnt32.exe wmpnt32.exe PID 2984 wrote to memory of 2664 2984 wmpnt32.exe wmpnt32.exe PID 2984 wrote to memory of 2664 2984 wmpnt32.exe wmpnt32.exe PID 2984 wrote to memory of 2664 2984 wmpnt32.exe wmpnt32.exe PID 2984 wrote to memory of 2664 2984 wmpnt32.exe wmpnt32.exe PID 2984 wrote to memory of 2664 2984 wmpnt32.exe wmpnt32.exe PID 2984 wrote to memory of 2664 2984 wmpnt32.exe wmpnt32.exe PID 2664 wrote to memory of 1196 2664 wmpnt32.exe Explorer.EXE PID 2664 wrote to memory of 1196 2664 wmpnt32.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\19032b4bb8b52eaa7957afa5a75d6e7d_JaffaCakes118.exe"3⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wmpnt32.exe"C:\Windows\SysWOW64\wmpnt32.exe" C:\Users\Admin\AppData\Local\Temp\19032B~1.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wmpnt32.exe"C:\Windows\SysWOW64\wmpnt32.exe" C:\Users\Admin\AppData\Local\Temp\19032B~1.EXE5⤵
- Modifies firewall policy service
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Impair Defenses
1Disable or Modify System Firewall
1Replay Monitor
Loading Replay Monitor...
Downloads
-
\Windows\SysWOW64\wmpnt32.exeFilesize
172KB
MD519032b4bb8b52eaa7957afa5a75d6e7d
SHA136887afafbdddcbb4166286806c858cae9f32f69
SHA256937a06010a344cd0f304cafd344d1bf33aeb625980b815826c22ea7a4edb4fc8
SHA512272fef9ab36a5f3515d24d9aa8079ecfeccb3cab4408311e9a3ac43806e5fdc72683a73d3f3e91e537c04bde0b11b37667eba197d114ba55f6127c6ade48faf0
-
memory/1196-46-0x0000000003E00000-0x0000000003E1E000-memory.dmpFilesize
120KB
-
memory/1196-48-0x0000000003160000-0x0000000003161000-memory.dmpFilesize
4KB
-
memory/2020-12-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2020-25-0x0000000002FC0000-0x0000000003000000-memory.dmpFilesize
256KB
-
memory/2020-1-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2020-11-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2020-5-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2020-3-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2020-7-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2020-10-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2020-44-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2020-13-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2020-24-0x0000000002FC0000-0x0000000003000000-memory.dmpFilesize
256KB
-
memory/2308-9-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/2308-0-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/2664-41-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2664-45-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2664-49-0x0000000000400000-0x000000000044C000-memory.dmpFilesize
304KB
-
memory/2984-36-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB
-
memory/2984-26-0x0000000000400000-0x0000000000440000-memory.dmpFilesize
256KB