Analysis
-
max time kernel
148s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 13:03
Behavioral task
behavioral1
Sample
dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe
-
Size
149KB
-
MD5
dc54cc5c1eca9c94f39d0b663da49ff5
-
SHA1
90cf8194fd9f19c869e4a611d59302bdd16dc558
-
SHA256
eda1658dbfc93eb3dc0a72cd52d96069c2ffd851cbac235efdd16533e84a166f
-
SHA512
a2502a895e6ccad085342a3d110a6c5f1bc35b220af2ddef4355ea63ee06ca71f4561e6ac27863a55aa439d4b4e98658b35928d9de32717d97b91c486bec440e
-
SSDEEP
3072:JYAq+Bt0h0phE8M4qTvpmwEBn3Obl4kUGE84NXaf4:JYtipO4qTvwwm0KD/e4
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
resource yara_rule behavioral1/files/0x0007000000012116-6.dat aspack_v212_v242 -
Executes dropped EXE 10 IoCs
pid Process 2740 tsqla.exe 2184 tsqla.exe 2396 tsqla.exe 2992 tsqla.exe 2856 tsqla.exe 2080 tsqla.exe 3004 tsqla.exe 2332 tsqla.exe 2020 tsqla.exe 1592 tsqla.exe -
Loads dropped DLL 20 IoCs
pid Process 1924 dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe 1924 dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe 2740 tsqla.exe 2740 tsqla.exe 2184 tsqla.exe 2184 tsqla.exe 2396 tsqla.exe 2396 tsqla.exe 2992 tsqla.exe 2992 tsqla.exe 2856 tsqla.exe 2856 tsqla.exe 2080 tsqla.exe 2080 tsqla.exe 3004 tsqla.exe 3004 tsqla.exe 2332 tsqla.exe 2332 tsqla.exe 2020 tsqla.exe 2020 tsqla.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\tsqla.exe dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File opened for modification C:\Windows\SysWOW64\tsqla.exe tsqla.exe File created C:\Windows\SysWOW64\tsqla.exe tsqla.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsqla.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1924 wrote to memory of 2740 1924 dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe 30 PID 1924 wrote to memory of 2740 1924 dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe 30 PID 1924 wrote to memory of 2740 1924 dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe 30 PID 1924 wrote to memory of 2740 1924 dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe 30 PID 2740 wrote to memory of 2184 2740 tsqla.exe 31 PID 2740 wrote to memory of 2184 2740 tsqla.exe 31 PID 2740 wrote to memory of 2184 2740 tsqla.exe 31 PID 2740 wrote to memory of 2184 2740 tsqla.exe 31 PID 2184 wrote to memory of 2396 2184 tsqla.exe 33 PID 2184 wrote to memory of 2396 2184 tsqla.exe 33 PID 2184 wrote to memory of 2396 2184 tsqla.exe 33 PID 2184 wrote to memory of 2396 2184 tsqla.exe 33 PID 2396 wrote to memory of 2992 2396 tsqla.exe 34 PID 2396 wrote to memory of 2992 2396 tsqla.exe 34 PID 2396 wrote to memory of 2992 2396 tsqla.exe 34 PID 2396 wrote to memory of 2992 2396 tsqla.exe 34 PID 2992 wrote to memory of 2856 2992 tsqla.exe 35 PID 2992 wrote to memory of 2856 2992 tsqla.exe 35 PID 2992 wrote to memory of 2856 2992 tsqla.exe 35 PID 2992 wrote to memory of 2856 2992 tsqla.exe 35 PID 2856 wrote to memory of 2080 2856 tsqla.exe 36 PID 2856 wrote to memory of 2080 2856 tsqla.exe 36 PID 2856 wrote to memory of 2080 2856 tsqla.exe 36 PID 2856 wrote to memory of 2080 2856 tsqla.exe 36 PID 2080 wrote to memory of 3004 2080 tsqla.exe 37 PID 2080 wrote to memory of 3004 2080 tsqla.exe 37 PID 2080 wrote to memory of 3004 2080 tsqla.exe 37 PID 2080 wrote to memory of 3004 2080 tsqla.exe 37 PID 3004 wrote to memory of 2332 3004 tsqla.exe 38 PID 3004 wrote to memory of 2332 3004 tsqla.exe 38 PID 3004 wrote to memory of 2332 3004 tsqla.exe 38 PID 3004 wrote to memory of 2332 3004 tsqla.exe 38 PID 2332 wrote to memory of 2020 2332 tsqla.exe 39 PID 2332 wrote to memory of 2020 2332 tsqla.exe 39 PID 2332 wrote to memory of 2020 2332 tsqla.exe 39 PID 2332 wrote to memory of 2020 2332 tsqla.exe 39 PID 2020 wrote to memory of 1592 2020 tsqla.exe 40 PID 2020 wrote to memory of 1592 2020 tsqla.exe 40 PID 2020 wrote to memory of 1592 2020 tsqla.exe 40 PID 2020 wrote to memory of 1592 2020 tsqla.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 476 "C:\Users\Admin\AppData\Local\Temp\dc54cc5c1eca9c94f39d0b663da49ff5_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 528 "C:\Windows\SysWOW64\tsqla.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 536 "C:\Windows\SysWOW64\tsqla.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 532 "C:\Windows\SysWOW64\tsqla.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 560 "C:\Windows\SysWOW64\tsqla.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 544 "C:\Windows\SysWOW64\tsqla.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 540 "C:\Windows\SysWOW64\tsqla.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 564 "C:\Windows\SysWOW64\tsqla.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 548 "C:\Windows\SysWOW64\tsqla.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\tsqla.exeC:\Windows\system32\tsqla.exe 552 "C:\Windows\SysWOW64\tsqla.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1592
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD5dc54cc5c1eca9c94f39d0b663da49ff5
SHA190cf8194fd9f19c869e4a611d59302bdd16dc558
SHA256eda1658dbfc93eb3dc0a72cd52d96069c2ffd851cbac235efdd16533e84a166f
SHA512a2502a895e6ccad085342a3d110a6c5f1bc35b220af2ddef4355ea63ee06ca71f4561e6ac27863a55aa439d4b4e98658b35928d9de32717d97b91c486bec440e