Analysis

  • max time kernel
    94s
  • max time network
    104s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240910-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240910-enlocale:en-usos:windows10-2004-x64system
  • submitted
    13-09-2024 03:40

General

  • Target

    dd986a9e0325a8c07f5f44733a8a23e7_JaffaCakes118.exe

  • Size

    58KB

  • MD5

    dd986a9e0325a8c07f5f44733a8a23e7

  • SHA1

    15112a9355e82e892c35ea2fcd3515652067d2fb

  • SHA256

    e5106f71b4b45225db98978824b4cce565ded15d793d95afeed8272eef83f1e1

  • SHA512

    55263d1aee691cfd090b6fe0e00615601b43394a90e4ab615cf3c2a2094298b88e4fdca3803feb578f4b1f094935bd92a021a03279f5b3e0e7720847bfe4560d

  • SSDEEP

    1536:JfWurKlsAiIWTiQalq7B7ccx2m1c5lkD:JNrqsAVWTocccx2m1c5lkD

Malware Config

Extracted

Family

metasploit

Version

encoder/fnstenv_mov

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dd986a9e0325a8c07f5f44733a8a23e7_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\dd986a9e0325a8c07f5f44733a8a23e7_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Users\Admin\AppData\Local\Temp\14EA.tmp
      C:\Users\Admin\AppData\Local\Temp\14EA.tmp
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2224

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\14EA.tmp

    Filesize

    31KB

    MD5

    a4987317613ec16eb0b11ca1ac11f4d6

    SHA1

    375eafb537ec8b69fd9f9bcebe17fd6af9665fc1

    SHA256

    14f4de1f17d6968c100f56ee42ad28d1fb1276ad69d30b8f6e361592044e6173

    SHA512

    c7e42b10b82d26b3ad508ef49ca0cb495285711ead7efaaba2ed79e29ac0500ad6b1109e1755c7ef926d8286c93aea5a05fe88edcd30189a9bbe3081113428f4

  • memory/2252-0-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2252-1-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB

  • memory/2252-6-0x0000000000400000-0x0000000000413000-memory.dmp

    Filesize

    76KB