Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
01-07-2024 20:26
Static task
static1
Behavioral task
behavioral1
Sample
1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe
-
Size
173KB
-
MD5
1c62959593f0191f22044f03e075e7e1
-
SHA1
9409c1dc0b8f40b4529c8cb4624447e497e15be2
-
SHA256
2842da89e0a9c89a580d8c6386962a245e86261346b0e33b4b09eccd30ef18c8
-
SHA512
bf6c2386d5c40c42398d882291938bc2d6839037f56aba31929e60a907e0ff8c98779f2f73d8fd60503bfc97895094bc0fd9a31b04befdfdc64dd177a93c0f31
-
SSDEEP
3072:ob7XJHAxTs95IGBkXLzf4q3Y8bPfMQOhZGj9AcO5mOAppD771Fuqmg1f:0TJHt4X/fJTbnMQUZGjmcLdf1Fuqmg1f
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service 3 TTPs 8 IoCs
Processes:
igfxpl86.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxpl86.exe = "C:\\Windows\\SysWOW64\\igfxpl86.exe:*:Enabled:Intel Control Panel" igfxpl86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List igfxpl86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile igfxpl86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications igfxpl86.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\DomainProfile\AuthorizedApplications\List\C:\Windows\SysWOW64\igfxpl86.exe = "C:\\Windows\\SysWOW64\\igfxpl86.exe:*:Enabled:Intel Control Panel" igfxpl86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List igfxpl86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile igfxpl86.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications igfxpl86.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe -
Deletes itself 1 IoCs
Processes:
igfxpl86.exepid process 4632 igfxpl86.exe -
Executes dropped EXE 2 IoCs
Processes:
igfxpl86.exeigfxpl86.exepid process 4756 igfxpl86.exe 4632 igfxpl86.exe -
Processes:
resource yara_rule behavioral2/memory/1232-0-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1232-2-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1232-4-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1232-3-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4632-43-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1232-44-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4632-46-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4632-47-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4632-48-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
igfxpl86.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Intel Control Panel = "C:\\Windows\\SysWOW64\\igfxpl86.exe" igfxpl86.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exeigfxpl86.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum igfxpl86.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 igfxpl86.exe -
Drops file in System32 directory 4 IoCs
Processes:
1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exeigfxpl86.exedescription ioc process File opened for modification C:\Windows\SysWOW64\ 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfxpl86.exe 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfxpl86.exe 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ igfxpl86.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exeigfxpl86.exedescription pid process target process PID 3324 set thread context of 1232 3324 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe PID 4756 set thread context of 4632 4756 igfxpl86.exe igfxpl86.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
Processes:
1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exeigfxpl86.exepid process 1232 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe 1232 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe 1232 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe 1232 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe 4632 igfxpl86.exe 4632 igfxpl86.exe 4632 igfxpl86.exe 4632 igfxpl86.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exeigfxpl86.exeigfxpl86.exedescription pid process target process PID 3324 wrote to memory of 1232 3324 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe PID 3324 wrote to memory of 1232 3324 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe PID 3324 wrote to memory of 1232 3324 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe PID 3324 wrote to memory of 1232 3324 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe PID 3324 wrote to memory of 1232 3324 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe PID 3324 wrote to memory of 1232 3324 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe PID 3324 wrote to memory of 1232 3324 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe PID 1232 wrote to memory of 4756 1232 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe igfxpl86.exe PID 1232 wrote to memory of 4756 1232 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe igfxpl86.exe PID 1232 wrote to memory of 4756 1232 1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe igfxpl86.exe PID 4756 wrote to memory of 4632 4756 igfxpl86.exe igfxpl86.exe PID 4756 wrote to memory of 4632 4756 igfxpl86.exe igfxpl86.exe PID 4756 wrote to memory of 4632 4756 igfxpl86.exe igfxpl86.exe PID 4756 wrote to memory of 4632 4756 igfxpl86.exe igfxpl86.exe PID 4756 wrote to memory of 4632 4756 igfxpl86.exe igfxpl86.exe PID 4756 wrote to memory of 4632 4756 igfxpl86.exe igfxpl86.exe PID 4756 wrote to memory of 4632 4756 igfxpl86.exe igfxpl86.exe PID 4632 wrote to memory of 3464 4632 igfxpl86.exe Explorer.EXE PID 4632 wrote to memory of 3464 4632 igfxpl86.exe Explorer.EXE
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
-
C:\Users\Admin\AppData\Local\Temp\1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1c62959593f0191f22044f03e075e7e1_JaffaCakes118.exe"3⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\igfxpl86.exe"C:\Windows\SysWOW64\igfxpl86.exe" C:\Users\Admin\AppData\Local\Temp\1C6295~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\igfxpl86.exe"C:\Windows\SysWOW64\igfxpl86.exe" C:\Users\Admin\AppData\Local\Temp\1C6295~1.EXE5⤵
- Modifies firewall policy service
- Deletes itself
- Executes dropped EXE
- Adds Run key to start application
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
Network
MITRE ATT&CK Matrix ATT&CK v13
Persistence
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Privilege Escalation
Create or Modify System Process
1Windows Service
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
2Impair Defenses
1Disable or Modify System Firewall
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Windows\SysWOW64\igfxpl86.exeFilesize
173KB
MD51c62959593f0191f22044f03e075e7e1
SHA19409c1dc0b8f40b4529c8cb4624447e497e15be2
SHA2562842da89e0a9c89a580d8c6386962a245e86261346b0e33b4b09eccd30ef18c8
SHA512bf6c2386d5c40c42398d882291938bc2d6839037f56aba31929e60a907e0ff8c98779f2f73d8fd60503bfc97895094bc0fd9a31b04befdfdc64dd177a93c0f31
-
memory/1232-0-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/1232-2-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/1232-4-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/1232-3-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/1232-44-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/4632-43-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/4632-46-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/4632-47-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB
-
memory/4632-48-0x0000000000400000-0x000000000044B000-memory.dmpFilesize
300KB