Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 09:16
Static task
static1
Behavioral task
behavioral1
Sample
1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe
-
Size
167KB
-
MD5
1abc024a550255457bb292b887ae31ae
-
SHA1
656a0e9e26b891ca879117cc26b80353ae555a10
-
SHA256
f4589c2261a234402da91b07356283abfdac7d9c751d8bbd629528f2f9f2278a
-
SHA512
236cccb4f18aa39e15e537380e2d7547358c7963ea553a16c0248fef0a28636e7082caf95c2cc44b588ef3058910b7a8b5c564f04ee9276459e21427e618b943
-
SSDEEP
3072:HbarHa7650JGtP5rahBouIMceuutFbG3p92smfbSsi8VJwo:Hur6FJGx5ryBo9MttIeDO8VJ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 3 TTPs 8 IoCs
Processes:
igfxcp86.exedescription ioc process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List igfxcp86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile igfxcp86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications igfxcp86.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxcp86.exe = "C:\\Windows\\SysWOW64\\igfxcp86.exe:*:Enabled:Intel System Monitor" igfxcp86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List igfxcp86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile igfxcp86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications igfxcp86.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxcp86.exe = "C:\\Windows\\SysWOW64\\igfxcp86.exe:*:Enabled:Intel System Monitor" igfxcp86.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1abc024a550255457bb292b887ae31ae_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2447855248-390457009-3660902674-1000\Control Panel\International\Geo\Nation 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
igfxcp86.exepid process 824 igfxcp86.exe -
Executes dropped EXE 2 IoCs
Processes:
igfxcp86.exeigfxcp86.exepid process 1736 igfxcp86.exe 824 igfxcp86.exe -
Processes:
resource yara_rule behavioral2/memory/776-0-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/776-2-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/776-3-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/776-4-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/824-42-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/776-44-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/824-46-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/824-47-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/824-48-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
igfxcp86.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Intel System Monitor = "C:\\Windows\\SysWOW64\\igfxcp86.exe" igfxcp86.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
1abc024a550255457bb292b887ae31ae_JaffaCakes118.exeigfxcp86.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxcp86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxcp86.exe -
Drops file in System32 directory 4 IoCs
Processes:
1abc024a550255457bb292b887ae31ae_JaffaCakes118.exeigfxcp86.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxcp86.exe 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxcp86.exe 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxcp86.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1abc024a550255457bb292b887ae31ae_JaffaCakes118.exeigfxcp86.exedescription pid process target process PID 1840 set thread context of 776 1840 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe PID 1736 set thread context of 824 1736 igfxcp86.exe igfxcp86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
1abc024a550255457bb292b887ae31ae_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
1abc024a550255457bb292b887ae31ae_JaffaCakes118.exeigfxcp86.exepid process 776 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe 776 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe 776 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe 776 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe 824 igfxcp86.exe 824 igfxcp86.exe 824 igfxcp86.exe 824 igfxcp86.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe1abc024a550255457bb292b887ae31ae_JaffaCakes118.exeigfxcp86.exeigfxcp86.exedescription pid process target process PID 1840 wrote to memory of 776 1840 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe PID 1840 wrote to memory of 776 1840 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe PID 1840 wrote to memory of 776 1840 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe PID 1840 wrote to memory of 776 1840 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe PID 1840 wrote to memory of 776 1840 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe PID 1840 wrote to memory of 776 1840 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe PID 1840 wrote to memory of 776 1840 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe PID 776 wrote to memory of 1736 776 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe igfxcp86.exe PID 776 wrote to memory of 1736 776 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe igfxcp86.exe PID 776 wrote to memory of 1736 776 1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe igfxcp86.exe PID 1736 wrote to memory of 824 1736 igfxcp86.exe igfxcp86.exe PID 1736 wrote to memory of 824 1736 igfxcp86.exe igfxcp86.exe PID 1736 wrote to memory of 824 1736 igfxcp86.exe igfxcp86.exe PID 1736 wrote to memory of 824 1736 igfxcp86.exe igfxcp86.exe PID 1736 wrote to memory of 824 1736 igfxcp86.exe igfxcp86.exe PID 1736 wrote to memory of 824 1736 igfxcp86.exe igfxcp86.exe PID 1736 wrote to memory of 824 1736 igfxcp86.exe igfxcp86.exe PID 824 wrote to memory of 3632 824 igfxcp86.exe Explorer.EXE PID 824 wrote to memory of 3632 824 igfxcp86.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1abc024a550255457bb292b887ae31ae_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\igfxcp86.exe"C:\Windows\SysWOW64\igfxcp86.exe" C:\Users\Admin\AppData\Local\Temp\1ABC02~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\igfxcp86.exe"C:\Windows\SysWOW64\igfxcp86.exe" C:\Users\Admin\AppData\Local\Temp\1ABC02~1.EXE5⤵
- Modifies firewall policy service
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Impair Defenses
1Disable or Modify System Firewall
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\igfxcp86.exeFilesize
167KB
MD51abc024a550255457bb292b887ae31ae
SHA1656a0e9e26b891ca879117cc26b80353ae555a10
SHA256f4589c2261a234402da91b07356283abfdac7d9c751d8bbd629528f2f9f2278a
SHA512236cccb4f18aa39e15e537380e2d7547358c7963ea553a16c0248fef0a28636e7082caf95c2cc44b588ef3058910b7a8b5c564f04ee9276459e21427e618b943
-
memory/776-0-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/776-2-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/776-3-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/776-4-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/776-44-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/824-42-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/824-46-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/824-47-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/824-48-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB