Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12-09-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe
-
Size
380KB
-
MD5
dcf23f4b8d8c2ac747b83d65afcf5e77
-
SHA1
86d032a7ce61f34b880908d441b85856c4234ee0
-
SHA256
eb2ec9859d7c87b0f71b1616fc481a2a0226d4403e3f4894218a394f32269199
-
SHA512
6295a17edc8ebda7af13ea82b035bc7aae92dd9dc0c0737ac05fd2ebec12b604b9ac8e187bd85da7ed66d2be61324fc6c21f81566ada92e0039450a18abf34c7
-
SSDEEP
6144:WRjfpbvNzGn6+MT1k6CW3e0dZfFgCZTdsmnElX9mzHsmaEJFLaXupTR5QWfdH:WRjfHza6+M5ko1dTdxGmnOX9uhL+KT4c
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 10 IoCs
pid Process 3476 wuauclt13.exe 1908 wuauclt13.exe 468 wuauclt13.exe 404 wuauclt13.exe 820 wuauclt13.exe 1476 wuauclt13.exe 1936 wuauclt13.exe 4036 wuauclt13.exe 1192 wuauclt13.exe 4572 wuauclt13.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 552 wrote to memory of 3476 552 dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe 91 PID 552 wrote to memory of 3476 552 dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe 91 PID 552 wrote to memory of 3476 552 dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe 91 PID 3476 wrote to memory of 1908 3476 wuauclt13.exe 103 PID 3476 wrote to memory of 1908 3476 wuauclt13.exe 103 PID 3476 wrote to memory of 1908 3476 wuauclt13.exe 103 PID 1908 wrote to memory of 468 1908 wuauclt13.exe 105 PID 1908 wrote to memory of 468 1908 wuauclt13.exe 105 PID 1908 wrote to memory of 468 1908 wuauclt13.exe 105 PID 468 wrote to memory of 404 468 wuauclt13.exe 107 PID 468 wrote to memory of 404 468 wuauclt13.exe 107 PID 468 wrote to memory of 404 468 wuauclt13.exe 107 PID 404 wrote to memory of 820 404 wuauclt13.exe 108 PID 404 wrote to memory of 820 404 wuauclt13.exe 108 PID 404 wrote to memory of 820 404 wuauclt13.exe 108 PID 820 wrote to memory of 1476 820 wuauclt13.exe 109 PID 820 wrote to memory of 1476 820 wuauclt13.exe 109 PID 820 wrote to memory of 1476 820 wuauclt13.exe 109 PID 1476 wrote to memory of 1936 1476 wuauclt13.exe 110 PID 1476 wrote to memory of 1936 1476 wuauclt13.exe 110 PID 1476 wrote to memory of 1936 1476 wuauclt13.exe 110 PID 1936 wrote to memory of 4036 1936 wuauclt13.exe 111 PID 1936 wrote to memory of 4036 1936 wuauclt13.exe 111 PID 1936 wrote to memory of 4036 1936 wuauclt13.exe 111 PID 4036 wrote to memory of 1192 4036 wuauclt13.exe 112 PID 4036 wrote to memory of 1192 4036 wuauclt13.exe 112 PID 4036 wrote to memory of 1192 4036 wuauclt13.exe 112 PID 1192 wrote to memory of 4572 1192 wuauclt13.exe 113 PID 1192 wrote to memory of 4572 1192 wuauclt13.exe 113 PID 1192 wrote to memory of 4572 1192 wuauclt13.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 1188 "C:\Users\Admin\AppData\Local\Temp\dcf23f4b8d8c2ac747b83d65afcf5e77_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 1156 "C:\Windows\SysWOW64\wuauclt13.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 1120 "C:\Windows\SysWOW64\wuauclt13.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 1124 "C:\Windows\SysWOW64\wuauclt13.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 1128 "C:\Windows\SysWOW64\wuauclt13.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:820 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 1132 "C:\Windows\SysWOW64\wuauclt13.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 1144 "C:\Windows\SysWOW64\wuauclt13.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 1136 "C:\Windows\SysWOW64\wuauclt13.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 1032 "C:\Windows\SysWOW64\wuauclt13.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 1112 "C:\Windows\SysWOW64\wuauclt13.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4572
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3908,i,8231329449558834090,4540802069600791165,262144 --variations-seed-version --mojo-platform-channel-handle=1048 /prefetch:81⤵PID:2136
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5dcf23f4b8d8c2ac747b83d65afcf5e77
SHA186d032a7ce61f34b880908d441b85856c4234ee0
SHA256eb2ec9859d7c87b0f71b1616fc481a2a0226d4403e3f4894218a394f32269199
SHA5126295a17edc8ebda7af13ea82b035bc7aae92dd9dc0c0737ac05fd2ebec12b604b9ac8e187bd85da7ed66d2be61324fc6c21f81566ada92e0039450a18abf34c7