Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17/08/2024, 10:30
Static task
static1
Behavioral task
behavioral1
Sample
a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe
-
Size
691KB
-
MD5
a230c386e62a940af1032a43d21a5639
-
SHA1
27961abb3bb04714c2f30d6fc341d94c78de021e
-
SHA256
5a422f7fe2d2ddab7a52ad2fdd0804e2ec3cbf3b1e5d7a9efe3826daab346845
-
SHA512
6c99b8ecda36d839a6222b9f938fe506ce2dc73eb8d35e832f9675e657d6a638e23208a477080a9c61f1ebd150e1edd55bf5539706eb48b6b52db04184d71995
-
SSDEEP
12288:wFmWt6bEx+TPSMwN2Pu+pSL97yTiuEfCy3CI+KQQMWD0qBo:Gt6DPCNy7QL97RzCy3CI7Qg0qBo
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 10 IoCs
pid Process 2284 msncfg.exe 2308 msncfg.exe 1480 msncfg.exe 2580 msncfg.exe 2028 msncfg.exe 2060 msncfg.exe 2092 msncfg.exe 2872 msncfg.exe 1908 msncfg.exe 2276 msncfg.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine msncfg.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine msncfg.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine msncfg.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine msncfg.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine msncfg.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine msncfg.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine msncfg.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine msncfg.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine msncfg.exe Key opened \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Software\Wine msncfg.exe -
Loads dropped DLL 20 IoCs
pid Process 2056 a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe 2056 a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe 2284 msncfg.exe 2284 msncfg.exe 2308 msncfg.exe 2308 msncfg.exe 1480 msncfg.exe 1480 msncfg.exe 2580 msncfg.exe 2580 msncfg.exe 2028 msncfg.exe 2028 msncfg.exe 2060 msncfg.exe 2060 msncfg.exe 2092 msncfg.exe 2092 msncfg.exe 2872 msncfg.exe 2872 msncfg.exe 1908 msncfg.exe 1908 msncfg.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\msncfg.exe msncfg.exe File opened for modification C:\Windows\SysWOW64\msncfg.exe msncfg.exe File opened for modification C:\Windows\SysWOW64\msncfg.exe msncfg.exe File opened for modification C:\Windows\SysWOW64\msncfg.exe msncfg.exe File opened for modification C:\Windows\SysWOW64\msncfg.exe msncfg.exe File created C:\Windows\SysWOW64\msncfg.exe msncfg.exe File opened for modification C:\Windows\SysWOW64\msncfg.exe msncfg.exe File opened for modification C:\Windows\SysWOW64\msncfg.exe a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe File created C:\Windows\SysWOW64\msncfg.exe msncfg.exe File created C:\Windows\SysWOW64\msncfg.exe msncfg.exe File opened for modification C:\Windows\SysWOW64\msncfg.exe msncfg.exe File created C:\Windows\SysWOW64\msncfg.exe msncfg.exe File opened for modification C:\Windows\SysWOW64\msncfg.exe msncfg.exe File created C:\Windows\SysWOW64\msncfg.exe msncfg.exe File opened for modification C:\Windows\SysWOW64\msncfg.exe msncfg.exe File opened for modification C:\Windows\SysWOW64\msncfg.exe msncfg.exe File opened for modification C:\Windows\SysWOW64\msncfg.exe msncfg.exe File created C:\Windows\SysWOW64\msncfg.exe msncfg.exe File created C:\Windows\SysWOW64\msncfg.exe msncfg.exe File created C:\Windows\SysWOW64\msncfg.exe msncfg.exe File created C:\Windows\SysWOW64\msncfg.exe msncfg.exe File created C:\Windows\SysWOW64\msncfg.exe a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2056 a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe 2284 msncfg.exe 2308 msncfg.exe 1480 msncfg.exe 2580 msncfg.exe 2028 msncfg.exe 2060 msncfg.exe 2092 msncfg.exe 2872 msncfg.exe 1908 msncfg.exe 2276 msncfg.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msncfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msncfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msncfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msncfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msncfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msncfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msncfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msncfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msncfg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msncfg.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2056 a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe 2284 msncfg.exe 2308 msncfg.exe 1480 msncfg.exe 2580 msncfg.exe 2028 msncfg.exe 2060 msncfg.exe 2092 msncfg.exe 2872 msncfg.exe 1908 msncfg.exe 2276 msncfg.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2284 2056 a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2284 2056 a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2284 2056 a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe 30 PID 2056 wrote to memory of 2284 2056 a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe 30 PID 2284 wrote to memory of 2308 2284 msncfg.exe 32 PID 2284 wrote to memory of 2308 2284 msncfg.exe 32 PID 2284 wrote to memory of 2308 2284 msncfg.exe 32 PID 2284 wrote to memory of 2308 2284 msncfg.exe 32 PID 2308 wrote to memory of 1480 2308 msncfg.exe 33 PID 2308 wrote to memory of 1480 2308 msncfg.exe 33 PID 2308 wrote to memory of 1480 2308 msncfg.exe 33 PID 2308 wrote to memory of 1480 2308 msncfg.exe 33 PID 1480 wrote to memory of 2580 1480 msncfg.exe 34 PID 1480 wrote to memory of 2580 1480 msncfg.exe 34 PID 1480 wrote to memory of 2580 1480 msncfg.exe 34 PID 1480 wrote to memory of 2580 1480 msncfg.exe 34 PID 2580 wrote to memory of 2028 2580 msncfg.exe 35 PID 2580 wrote to memory of 2028 2580 msncfg.exe 35 PID 2580 wrote to memory of 2028 2580 msncfg.exe 35 PID 2580 wrote to memory of 2028 2580 msncfg.exe 35 PID 2028 wrote to memory of 2060 2028 msncfg.exe 36 PID 2028 wrote to memory of 2060 2028 msncfg.exe 36 PID 2028 wrote to memory of 2060 2028 msncfg.exe 36 PID 2028 wrote to memory of 2060 2028 msncfg.exe 36 PID 2060 wrote to memory of 2092 2060 msncfg.exe 37 PID 2060 wrote to memory of 2092 2060 msncfg.exe 37 PID 2060 wrote to memory of 2092 2060 msncfg.exe 37 PID 2060 wrote to memory of 2092 2060 msncfg.exe 37 PID 2092 wrote to memory of 2872 2092 msncfg.exe 38 PID 2092 wrote to memory of 2872 2092 msncfg.exe 38 PID 2092 wrote to memory of 2872 2092 msncfg.exe 38 PID 2092 wrote to memory of 2872 2092 msncfg.exe 38 PID 2872 wrote to memory of 1908 2872 msncfg.exe 39 PID 2872 wrote to memory of 1908 2872 msncfg.exe 39 PID 2872 wrote to memory of 1908 2872 msncfg.exe 39 PID 2872 wrote to memory of 1908 2872 msncfg.exe 39 PID 1908 wrote to memory of 2276 1908 msncfg.exe 40 PID 1908 wrote to memory of 2276 1908 msncfg.exe 40 PID 1908 wrote to memory of 2276 1908 msncfg.exe 40 PID 1908 wrote to memory of 2276 1908 msncfg.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\msncfg.exeC:\Windows\system32\msncfg.exe 676 "C:\Users\Admin\AppData\Local\Temp\a230c386e62a940af1032a43d21a5639_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\msncfg.exeC:\Windows\system32\msncfg.exe 740 "C:\Windows\SysWOW64\msncfg.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\msncfg.exeC:\Windows\system32\msncfg.exe 744 "C:\Windows\SysWOW64\msncfg.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\msncfg.exeC:\Windows\system32\msncfg.exe 748 "C:\Windows\SysWOW64\msncfg.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\msncfg.exeC:\Windows\system32\msncfg.exe 760 "C:\Windows\SysWOW64\msncfg.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\msncfg.exeC:\Windows\system32\msncfg.exe 756 "C:\Windows\SysWOW64\msncfg.exe"7⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\msncfg.exeC:\Windows\system32\msncfg.exe 768 "C:\Windows\SysWOW64\msncfg.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\msncfg.exeC:\Windows\system32\msncfg.exe 776 "C:\Windows\SysWOW64\msncfg.exe"9⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\msncfg.exeC:\Windows\system32\msncfg.exe 772 "C:\Windows\SysWOW64\msncfg.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\msncfg.exeC:\Windows\system32\msncfg.exe 764 "C:\Windows\SysWOW64\msncfg.exe"11⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2276
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
691KB
MD5a230c386e62a940af1032a43d21a5639
SHA127961abb3bb04714c2f30d6fc341d94c78de021e
SHA2565a422f7fe2d2ddab7a52ad2fdd0804e2ec3cbf3b1e5d7a9efe3826daab346845
SHA5126c99b8ecda36d839a6222b9f938fe506ce2dc73eb8d35e832f9675e657d6a638e23208a477080a9c61f1ebd150e1edd55bf5539706eb48b6b52db04184d71995