Analysis
-
max time kernel
148s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12/07/2024, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe
-
Size
265KB
-
MD5
3f4823fdae4804d5bf5d05effd0a9849
-
SHA1
1998ec66a865f99724137586adc27f04dbd55ee8
-
SHA256
e4978064cdb5fa609a0c55d8e71a6d0c49bb9d3e43941aab62dfca67203ee1a8
-
SHA512
917748ae8c677a11c2cc436254331bedd6904177c10b5447af3662158f07dab974d4e7b62b9dfdad557fd66d616b79d796a41a2e881b76253bb3a5c322388489
-
SSDEEP
6144:XFrD6QHF+b9vtt7Ucy2g6Dk7hvpQSwAxM8uV4f0wsw:X96QH89vtdUbVGShlwA28uVTwj
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 10 IoCs
pid Process 2568 spwls.exe 1160 spwls.exe 2828 spwls.exe 2612 spwls.exe 616 spwls.exe 1892 spwls.exe 2112 spwls.exe 476 spwls.exe 1716 spwls.exe 3056 spwls.exe -
Loads dropped DLL 20 IoCs
pid Process 2824 3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe 2824 3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe 2568 spwls.exe 2568 spwls.exe 1160 spwls.exe 1160 spwls.exe 2828 spwls.exe 2828 spwls.exe 2612 spwls.exe 2612 spwls.exe 616 spwls.exe 616 spwls.exe 1892 spwls.exe 1892 spwls.exe 2112 spwls.exe 2112 spwls.exe 476 spwls.exe 476 spwls.exe 1716 spwls.exe 1716 spwls.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 11 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 spwls.exe File opened for modification \??\PhysicalDrive0 spwls.exe File opened for modification \??\PhysicalDrive0 spwls.exe File opened for modification \??\PhysicalDrive0 spwls.exe File opened for modification \??\PhysicalDrive0 spwls.exe File opened for modification \??\PhysicalDrive0 spwls.exe File opened for modification \??\PhysicalDrive0 spwls.exe File opened for modification \??\PhysicalDrive0 3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 spwls.exe File opened for modification \??\PhysicalDrive0 spwls.exe File opened for modification \??\PhysicalDrive0 spwls.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\spwls.exe spwls.exe File created C:\Windows\SysWOW64\spwls.exe spwls.exe File created C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini spwls.exe File created C:\Windows\SysWOW64\spwls.exe spwls.exe File created C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini spwls.exe File created C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini spwls.exe File opened for modification C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini spwls.exe File created C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\spwls.exe spwls.exe File created C:\Windows\SysWOW64\spwls.exe 3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe File created C:\Windows\SysWOW64\spwls.exe spwls.exe File created C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini spwls.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini spwls.exe File created C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\spwls.exe 3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini spwls.exe File opened for modification C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini spwls.exe File created C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini spwls.exe File opened for modification C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\spwls.exe spwls.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini spwls.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2568 2824 3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2568 2824 3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2568 2824 3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe 30 PID 2824 wrote to memory of 2568 2824 3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe 30 PID 2568 wrote to memory of 1160 2568 spwls.exe 31 PID 2568 wrote to memory of 1160 2568 spwls.exe 31 PID 2568 wrote to memory of 1160 2568 spwls.exe 31 PID 2568 wrote to memory of 1160 2568 spwls.exe 31 PID 1160 wrote to memory of 2828 1160 spwls.exe 32 PID 1160 wrote to memory of 2828 1160 spwls.exe 32 PID 1160 wrote to memory of 2828 1160 spwls.exe 32 PID 1160 wrote to memory of 2828 1160 spwls.exe 32 PID 2828 wrote to memory of 2612 2828 spwls.exe 33 PID 2828 wrote to memory of 2612 2828 spwls.exe 33 PID 2828 wrote to memory of 2612 2828 spwls.exe 33 PID 2828 wrote to memory of 2612 2828 spwls.exe 33 PID 2612 wrote to memory of 616 2612 spwls.exe 34 PID 2612 wrote to memory of 616 2612 spwls.exe 34 PID 2612 wrote to memory of 616 2612 spwls.exe 34 PID 2612 wrote to memory of 616 2612 spwls.exe 34 PID 616 wrote to memory of 1892 616 spwls.exe 35 PID 616 wrote to memory of 1892 616 spwls.exe 35 PID 616 wrote to memory of 1892 616 spwls.exe 35 PID 616 wrote to memory of 1892 616 spwls.exe 35 PID 1892 wrote to memory of 2112 1892 spwls.exe 36 PID 1892 wrote to memory of 2112 1892 spwls.exe 36 PID 1892 wrote to memory of 2112 1892 spwls.exe 36 PID 1892 wrote to memory of 2112 1892 spwls.exe 36 PID 2112 wrote to memory of 476 2112 spwls.exe 37 PID 2112 wrote to memory of 476 2112 spwls.exe 37 PID 2112 wrote to memory of 476 2112 spwls.exe 37 PID 2112 wrote to memory of 476 2112 spwls.exe 37 PID 476 wrote to memory of 1716 476 spwls.exe 38 PID 476 wrote to memory of 1716 476 spwls.exe 38 PID 476 wrote to memory of 1716 476 spwls.exe 38 PID 476 wrote to memory of 1716 476 spwls.exe 38 PID 1716 wrote to memory of 3056 1716 spwls.exe 39 PID 1716 wrote to memory of 3056 1716 spwls.exe 39 PID 1716 wrote to memory of 3056 1716 spwls.exe 39 PID 1716 wrote to memory of 3056 1716 spwls.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\spwls.exeC:\Windows\system32\spwls.exe 476 "C:\Users\Admin\AppData\Local\Temp\3f4823fdae4804d5bf5d05effd0a9849_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\spwls.exeC:\Windows\system32\spwls.exe 528 "C:\Windows\SysWOW64\spwls.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\spwls.exeC:\Windows\system32\spwls.exe 532 "C:\Windows\SysWOW64\spwls.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\spwls.exeC:\Windows\system32\spwls.exe 520 "C:\Windows\SysWOW64\spwls.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\spwls.exeC:\Windows\system32\spwls.exe 552 "C:\Windows\SysWOW64\spwls.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:616 -
C:\Windows\SysWOW64\spwls.exeC:\Windows\system32\spwls.exe 548 "C:\Windows\SysWOW64\spwls.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\spwls.exeC:\Windows\system32\spwls.exe 540 "C:\Windows\SysWOW64\spwls.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\spwls.exeC:\Windows\system32\spwls.exe 560 "C:\Windows\SysWOW64\spwls.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:476 -
C:\Windows\SysWOW64\spwls.exeC:\Windows\system32\spwls.exe 568 "C:\Windows\SysWOW64\spwls.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\spwls.exeC:\Windows\system32\spwls.exe 564 "C:\Windows\SysWOW64\spwls.exe"11⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
PID:3056
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD53f4823fdae4804d5bf5d05effd0a9849
SHA11998ec66a865f99724137586adc27f04dbd55ee8
SHA256e4978064cdb5fa609a0c55d8e71a6d0c49bb9d3e43941aab62dfca67203ee1a8
SHA512917748ae8c677a11c2cc436254331bedd6904177c10b5447af3662158f07dab974d4e7b62b9dfdad557fd66d616b79d796a41a2e881b76253bb3a5c322388489