Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
22/07/2024, 19:52
Static task
static1
Behavioral task
behavioral1
Sample
6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe
-
Size
630KB
-
MD5
6494292827f0fccee4684eccb3fa77ad
-
SHA1
8d3add5eb37ed4a654af83cc94b981509799557a
-
SHA256
8f7db181fa41ee4e7b72620140d177c03c807d4cc9e876b2cdcdb4157854c16f
-
SHA512
5122ae3032cb5549295bf21e545c1267463e21b251f46d8cb731bd6228fab4b342b47b071854093676e332b7f20527aaa1ef57d6517e7fe6e43df7524bf2b25a
-
SSDEEP
12288:AFBTF7yMqTozXeaZw+96f7z398gucKKmTLKIpiZEUO9:ArFWM/zXeWw26n3OZp9
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 20 IoCs
pid Process 1400 taskmrg.exe 2744 taskmrg.exe 2632 taskmrg.exe 2692 taskmrg.exe 2260 taskmrg.exe 2856 taskmrg.exe 760 taskmrg.exe 480 taskmrg.exe 1748 taskmrg.exe 444 taskmrg.exe 904 taskmrg.exe 1772 taskmrg.exe 2332 taskmrg.exe 1752 taskmrg.exe 1816 taskmrg.exe 2008 taskmrg.exe 2764 taskmrg.exe 2084 taskmrg.exe 2428 taskmrg.exe 2952 taskmrg.exe -
Loads dropped DLL 21 IoCs
pid Process 3004 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 3004 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 1400 taskmrg.exe 2744 taskmrg.exe 2744 taskmrg.exe 2692 taskmrg.exe 2692 taskmrg.exe 2856 taskmrg.exe 2856 taskmrg.exe 480 taskmrg.exe 480 taskmrg.exe 444 taskmrg.exe 444 taskmrg.exe 1772 taskmrg.exe 1772 taskmrg.exe 1752 taskmrg.exe 1752 taskmrg.exe 2008 taskmrg.exe 2008 taskmrg.exe 2084 taskmrg.exe 2084 taskmrg.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2568 set thread context of 3004 2568 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 30 PID 1400 set thread context of 2744 1400 taskmrg.exe 32 PID 2632 set thread context of 2692 2632 taskmrg.exe 35 PID 2260 set thread context of 2856 2260 taskmrg.exe 37 PID 760 set thread context of 480 760 taskmrg.exe 39 PID 1748 set thread context of 444 1748 taskmrg.exe 41 PID 904 set thread context of 1772 904 taskmrg.exe 43 PID 2332 set thread context of 1752 2332 taskmrg.exe 45 PID 1816 set thread context of 2008 1816 taskmrg.exe 47 PID 2764 set thread context of 2084 2764 taskmrg.exe 49 PID 2428 set thread context of 2952 2428 taskmrg.exe 51 -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2568 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 1400 taskmrg.exe 2632 taskmrg.exe 2260 taskmrg.exe 760 taskmrg.exe 1748 taskmrg.exe 904 taskmrg.exe 2332 taskmrg.exe 1816 taskmrg.exe 2764 taskmrg.exe 2428 taskmrg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2568 wrote to memory of 3004 2568 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3004 2568 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3004 2568 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3004 2568 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3004 2568 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3004 2568 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3004 2568 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3004 2568 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3004 2568 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3004 2568 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3004 2568 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 30 PID 2568 wrote to memory of 3004 2568 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 30 PID 3004 wrote to memory of 1400 3004 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 31 PID 3004 wrote to memory of 1400 3004 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 31 PID 3004 wrote to memory of 1400 3004 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 31 PID 3004 wrote to memory of 1400 3004 6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe 31 PID 1400 wrote to memory of 2744 1400 taskmrg.exe 32 PID 1400 wrote to memory of 2744 1400 taskmrg.exe 32 PID 1400 wrote to memory of 2744 1400 taskmrg.exe 32 PID 1400 wrote to memory of 2744 1400 taskmrg.exe 32 PID 1400 wrote to memory of 2744 1400 taskmrg.exe 32 PID 1400 wrote to memory of 2744 1400 taskmrg.exe 32 PID 1400 wrote to memory of 2744 1400 taskmrg.exe 32 PID 1400 wrote to memory of 2744 1400 taskmrg.exe 32 PID 1400 wrote to memory of 2744 1400 taskmrg.exe 32 PID 1400 wrote to memory of 2744 1400 taskmrg.exe 32 PID 1400 wrote to memory of 2744 1400 taskmrg.exe 32 PID 1400 wrote to memory of 2744 1400 taskmrg.exe 32 PID 2744 wrote to memory of 2632 2744 taskmrg.exe 34 PID 2744 wrote to memory of 2632 2744 taskmrg.exe 34 PID 2744 wrote to memory of 2632 2744 taskmrg.exe 34 PID 2744 wrote to memory of 2632 2744 taskmrg.exe 34 PID 2632 wrote to memory of 2692 2632 taskmrg.exe 35 PID 2632 wrote to memory of 2692 2632 taskmrg.exe 35 PID 2632 wrote to memory of 2692 2632 taskmrg.exe 35 PID 2632 wrote to memory of 2692 2632 taskmrg.exe 35 PID 2632 wrote to memory of 2692 2632 taskmrg.exe 35 PID 2632 wrote to memory of 2692 2632 taskmrg.exe 35 PID 2632 wrote to memory of 2692 2632 taskmrg.exe 35 PID 2632 wrote to memory of 2692 2632 taskmrg.exe 35 PID 2632 wrote to memory of 2692 2632 taskmrg.exe 35 PID 2632 wrote to memory of 2692 2632 taskmrg.exe 35 PID 2632 wrote to memory of 2692 2632 taskmrg.exe 35 PID 2632 wrote to memory of 2692 2632 taskmrg.exe 35 PID 2692 wrote to memory of 2260 2692 taskmrg.exe 36 PID 2692 wrote to memory of 2260 2692 taskmrg.exe 36 PID 2692 wrote to memory of 2260 2692 taskmrg.exe 36 PID 2692 wrote to memory of 2260 2692 taskmrg.exe 36 PID 2260 wrote to memory of 2856 2260 taskmrg.exe 37 PID 2260 wrote to memory of 2856 2260 taskmrg.exe 37 PID 2260 wrote to memory of 2856 2260 taskmrg.exe 37 PID 2260 wrote to memory of 2856 2260 taskmrg.exe 37 PID 2260 wrote to memory of 2856 2260 taskmrg.exe 37 PID 2260 wrote to memory of 2856 2260 taskmrg.exe 37 PID 2260 wrote to memory of 2856 2260 taskmrg.exe 37 PID 2260 wrote to memory of 2856 2260 taskmrg.exe 37 PID 2260 wrote to memory of 2856 2260 taskmrg.exe 37 PID 2260 wrote to memory of 2856 2260 taskmrg.exe 37 PID 2260 wrote to memory of 2856 2260 taskmrg.exe 37 PID 2260 wrote to memory of 2856 2260 taskmrg.exe 37 PID 2856 wrote to memory of 760 2856 taskmrg.exe 38 PID 2856 wrote to memory of 760 2856 taskmrg.exe 38 PID 2856 wrote to memory of 760 2856 taskmrg.exe 38 PID 2856 wrote to memory of 760 2856 taskmrg.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 528 "C:\Users\Admin\AppData\Local\Temp\6494292827f0fccee4684eccb3fa77ad_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Windows\SysWOW64\taskmrg.exe
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\taskmrg.exe
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\taskmrg.exe
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Windows\SysWOW64\taskmrg.exe
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:480 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1748 -
C:\Windows\SysWOW64\taskmrg.exe
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:444 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:904 -
C:\Windows\SysWOW64\taskmrg.exe
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1772 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\Windows\SysWOW64\taskmrg.exe
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1752 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1816 -
C:\Windows\SysWOW64\taskmrg.exe
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2008 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 528 "C:\Windows\SysWOW64\taskmrg.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2764 -
C:\Windows\SysWOW64\taskmrg.exe
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2084 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 524 "C:\Windows\SysWOW64\taskmrg.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Windows\SysWOW64\taskmrg.exe
- Executes dropped EXE
- Drops file in System32 directory
PID:2952
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
630KB
MD56494292827f0fccee4684eccb3fa77ad
SHA18d3add5eb37ed4a654af83cc94b981509799557a
SHA2568f7db181fa41ee4e7b72620140d177c03c807d4cc9e876b2cdcdb4157854c16f
SHA5125122ae3032cb5549295bf21e545c1267463e21b251f46d8cb731bd6228fab4b342b47b071854093676e332b7f20527aaa1ef57d6517e7fe6e43df7524bf2b25a