Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12-09-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe
-
Size
380KB
-
MD5
dcf23f4b8d8c2ac747b83d65afcf5e77
-
SHA1
86d032a7ce61f34b880908d441b85856c4234ee0
-
SHA256
eb2ec9859d7c87b0f71b1616fc481a2a0226d4403e3f4894218a394f32269199
-
SHA512
6295a17edc8ebda7af13ea82b035bc7aae92dd9dc0c0737ac05fd2ebec12b604b9ac8e187bd85da7ed66d2be61324fc6c21f81566ada92e0039450a18abf34c7
-
SSDEEP
6144:WRjfpbvNzGn6+MT1k6CW3e0dZfFgCZTdsmnElX9mzHsmaEJFLaXupTR5QWfdH:WRjfHza6+M5ko1dTdxGmnOX9uhL+KT4c
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 10 IoCs
pid Process 2672 wuauclt13.exe 2712 wuauclt13.exe 2444 wuauclt13.exe 1732 wuauclt13.exe 2376 wuauclt13.exe 1940 wuauclt13.exe 2880 wuauclt13.exe 1720 wuauclt13.exe 1664 wuauclt13.exe 2232 wuauclt13.exe -
Loads dropped DLL 20 IoCs
pid Process 1740 dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe 1740 dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe 2672 wuauclt13.exe 2672 wuauclt13.exe 2712 wuauclt13.exe 2712 wuauclt13.exe 2444 wuauclt13.exe 2444 wuauclt13.exe 1732 wuauclt13.exe 1732 wuauclt13.exe 2376 wuauclt13.exe 2376 wuauclt13.exe 1940 wuauclt13.exe 1940 wuauclt13.exe 2880 wuauclt13.exe 2880 wuauclt13.exe 1720 wuauclt13.exe 1720 wuauclt13.exe 1664 wuauclt13.exe 1664 wuauclt13.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1740 wrote to memory of 2672 1740 dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe 31 PID 1740 wrote to memory of 2672 1740 dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe 31 PID 1740 wrote to memory of 2672 1740 dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe 31 PID 1740 wrote to memory of 2672 1740 dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe 31 PID 2672 wrote to memory of 2712 2672 wuauclt13.exe 32 PID 2672 wrote to memory of 2712 2672 wuauclt13.exe 32 PID 2672 wrote to memory of 2712 2672 wuauclt13.exe 32 PID 2672 wrote to memory of 2712 2672 wuauclt13.exe 32 PID 2712 wrote to memory of 2444 2712 wuauclt13.exe 33 PID 2712 wrote to memory of 2444 2712 wuauclt13.exe 33 PID 2712 wrote to memory of 2444 2712 wuauclt13.exe 33 PID 2712 wrote to memory of 2444 2712 wuauclt13.exe 33 PID 2444 wrote to memory of 1732 2444 wuauclt13.exe 34 PID 2444 wrote to memory of 1732 2444 wuauclt13.exe 34 PID 2444 wrote to memory of 1732 2444 wuauclt13.exe 34 PID 2444 wrote to memory of 1732 2444 wuauclt13.exe 34 PID 1732 wrote to memory of 2376 1732 wuauclt13.exe 35 PID 1732 wrote to memory of 2376 1732 wuauclt13.exe 35 PID 1732 wrote to memory of 2376 1732 wuauclt13.exe 35 PID 1732 wrote to memory of 2376 1732 wuauclt13.exe 35 PID 2376 wrote to memory of 1940 2376 wuauclt13.exe 36 PID 2376 wrote to memory of 1940 2376 wuauclt13.exe 36 PID 2376 wrote to memory of 1940 2376 wuauclt13.exe 36 PID 2376 wrote to memory of 1940 2376 wuauclt13.exe 36 PID 1940 wrote to memory of 2880 1940 wuauclt13.exe 37 PID 1940 wrote to memory of 2880 1940 wuauclt13.exe 37 PID 1940 wrote to memory of 2880 1940 wuauclt13.exe 37 PID 1940 wrote to memory of 2880 1940 wuauclt13.exe 37 PID 2880 wrote to memory of 1720 2880 wuauclt13.exe 39 PID 2880 wrote to memory of 1720 2880 wuauclt13.exe 39 PID 2880 wrote to memory of 1720 2880 wuauclt13.exe 39 PID 2880 wrote to memory of 1720 2880 wuauclt13.exe 39 PID 1720 wrote to memory of 1664 1720 wuauclt13.exe 40 PID 1720 wrote to memory of 1664 1720 wuauclt13.exe 40 PID 1720 wrote to memory of 1664 1720 wuauclt13.exe 40 PID 1720 wrote to memory of 1664 1720 wuauclt13.exe 40 PID 1664 wrote to memory of 2232 1664 wuauclt13.exe 41 PID 1664 wrote to memory of 2232 1664 wuauclt13.exe 41 PID 1664 wrote to memory of 2232 1664 wuauclt13.exe 41 PID 1664 wrote to memory of 2232 1664 wuauclt13.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 524 "C:\Users\Admin\AppData\Local\Temp\dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 516 "C:\Windows\SysWOW64\wuauclt13.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 520 "C:\Windows\SysWOW64\wuauclt13.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 528 "C:\Windows\SysWOW64\wuauclt13.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 536 "C:\Windows\SysWOW64\wuauclt13.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 548 "C:\Windows\SysWOW64\wuauclt13.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 560 "C:\Windows\SysWOW64\wuauclt13.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 532 "C:\Windows\SysWOW64\wuauclt13.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 552 "C:\Windows\SysWOW64\wuauclt13.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 556 "C:\Windows\SysWOW64\wuauclt13.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2232
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5dcf23f4b8d8c2ac747b83d65afcf5e77
SHA186d032a7ce61f34b880908d441b85856c4234ee0
SHA256eb2ec9859d7c87b0f71b1616fc481a2a0226d4403e3f4894218a394f32269199
SHA5126295a17edc8ebda7af13ea82b035bc7aae92dd9dc0c0737ac05fd2ebec12b604b9ac8e187bd85da7ed66d2be61324fc6c21f81566ada92e0039450a18abf34c7