Analysis
-
max time kernel
141s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 07:25
Behavioral task
behavioral1
Sample
e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe
-
Size
625KB
-
MD5
e1f9aa091985cd7b59432ccbb1b7fd34
-
SHA1
529eb56b97d67f1c124512292b2210512ece3c5d
-
SHA256
b6530b4fcd3716cc94bc25ab09c8d34c083145424f4ee34123db41bcb9fe6b8e
-
SHA512
b4c2fe12d34e78903dee25a122faf8d51296c2bc5b9533cca0f632bcefa58c57842ddeb9b04b4ab13b6f27c2ca0065bc211a46127c32bcf4fc898e38d7747231
-
SSDEEP
12288:EE4E2NoeW6XuHB/7UFjnHIM+gB4GmCiMOBRQ8RTZIg3wPGDMlongmGcUO:EfmeWR/Y9h7ECiZz/RSggeDMmQ5O
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 10 IoCs
pid Process 2800 kernel32.exe 2536 kernel32.exe 1656 kernel32.exe 3040 kernel32.exe 2440 kernel32.exe 1124 kernel32.exe 1724 kernel32.exe 2776 kernel32.exe 2668 kernel32.exe 2424 kernel32.exe -
Loads dropped DLL 20 IoCs
pid Process 2876 e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe 2876 e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe 2800 kernel32.exe 2800 kernel32.exe 2536 kernel32.exe 2536 kernel32.exe 1656 kernel32.exe 1656 kernel32.exe 3040 kernel32.exe 3040 kernel32.exe 2440 kernel32.exe 2440 kernel32.exe 1124 kernel32.exe 1124 kernel32.exe 1724 kernel32.exe 1724 kernel32.exe 2776 kernel32.exe 2776 kernel32.exe 2668 kernel32.exe 2668 kernel32.exe -
resource yara_rule behavioral1/memory/2876-2-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2876-4-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2876-3-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/files/0x000d000000012251-8.dat themida behavioral1/memory/2876-10-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2800-19-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2800-18-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2800-20-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2800-21-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2800-22-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2800-24-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2536-28-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2536-29-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2536-30-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2536-31-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2536-32-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2536-35-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/1656-38-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/1656-39-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/1656-40-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/1656-41-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/1656-42-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/1656-43-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/1656-45-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/3040-49-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/3040-53-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2440-54-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2440-58-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/1124-59-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/1124-63-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/1724-64-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/1724-68-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2776-69-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2776-73-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2668-74-0x0000000000400000-0x00000000005BA000-memory.dmp themida behavioral1/memory/2668-78-0x0000000000400000-0x00000000005BA000-memory.dmp themida -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\kernel32.exe e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\kernel32.exe kernel32.exe File created C:\Windows\SysWOW64\kernel32.exe kernel32.exe File opened for modification C:\Windows\SysWOW64\kernel32.exe kernel32.exe File opened for modification C:\Windows\SysWOW64\kernel32.exe kernel32.exe File created C:\Windows\SysWOW64\kernel32.exe kernel32.exe File created C:\Windows\SysWOW64\kernel32.exe kernel32.exe File created C:\Windows\SysWOW64\kernel32.exe kernel32.exe File created C:\Windows\SysWOW64\kernel32.exe kernel32.exe File opened for modification C:\Windows\SysWOW64\kernel32.exe kernel32.exe File opened for modification C:\Windows\SysWOW64\kernel32.exe kernel32.exe File created C:\Windows\SysWOW64\kernel32.exe e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\kernel32.exe kernel32.exe File created C:\Windows\SysWOW64\kernel32.exe kernel32.exe File opened for modification C:\Windows\SysWOW64\kernel32.exe kernel32.exe File created C:\Windows\SysWOW64\kernel32.exe kernel32.exe File opened for modification C:\Windows\SysWOW64\kernel32.exe kernel32.exe File created C:\Windows\SysWOW64\kernel32.exe kernel32.exe File opened for modification C:\Windows\SysWOW64\kernel32.exe kernel32.exe File created C:\Windows\SysWOW64\kernel32.exe kernel32.exe File opened for modification C:\Windows\SysWOW64\kernel32.exe kernel32.exe File created C:\Windows\SysWOW64\kernel32.exe kernel32.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kernel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kernel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kernel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kernel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kernel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kernel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kernel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kernel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kernel32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kernel32.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2876 e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe 2800 kernel32.exe 2536 kernel32.exe 1656 kernel32.exe 3040 kernel32.exe 2440 kernel32.exe 1124 kernel32.exe 1724 kernel32.exe 2776 kernel32.exe 2668 kernel32.exe 2424 kernel32.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2876 wrote to memory of 2800 2876 e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2800 2876 e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2800 2876 e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe 30 PID 2876 wrote to memory of 2800 2876 e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe 30 PID 2800 wrote to memory of 2536 2800 kernel32.exe 31 PID 2800 wrote to memory of 2536 2800 kernel32.exe 31 PID 2800 wrote to memory of 2536 2800 kernel32.exe 31 PID 2800 wrote to memory of 2536 2800 kernel32.exe 31 PID 2536 wrote to memory of 1656 2536 kernel32.exe 32 PID 2536 wrote to memory of 1656 2536 kernel32.exe 32 PID 2536 wrote to memory of 1656 2536 kernel32.exe 32 PID 2536 wrote to memory of 1656 2536 kernel32.exe 32 PID 1656 wrote to memory of 3040 1656 kernel32.exe 33 PID 1656 wrote to memory of 3040 1656 kernel32.exe 33 PID 1656 wrote to memory of 3040 1656 kernel32.exe 33 PID 1656 wrote to memory of 3040 1656 kernel32.exe 33 PID 3040 wrote to memory of 2440 3040 kernel32.exe 34 PID 3040 wrote to memory of 2440 3040 kernel32.exe 34 PID 3040 wrote to memory of 2440 3040 kernel32.exe 34 PID 3040 wrote to memory of 2440 3040 kernel32.exe 34 PID 2440 wrote to memory of 1124 2440 kernel32.exe 35 PID 2440 wrote to memory of 1124 2440 kernel32.exe 35 PID 2440 wrote to memory of 1124 2440 kernel32.exe 35 PID 2440 wrote to memory of 1124 2440 kernel32.exe 35 PID 1124 wrote to memory of 1724 1124 kernel32.exe 36 PID 1124 wrote to memory of 1724 1124 kernel32.exe 36 PID 1124 wrote to memory of 1724 1124 kernel32.exe 36 PID 1124 wrote to memory of 1724 1124 kernel32.exe 36 PID 1724 wrote to memory of 2776 1724 kernel32.exe 37 PID 1724 wrote to memory of 2776 1724 kernel32.exe 37 PID 1724 wrote to memory of 2776 1724 kernel32.exe 37 PID 1724 wrote to memory of 2776 1724 kernel32.exe 37 PID 2776 wrote to memory of 2668 2776 kernel32.exe 38 PID 2776 wrote to memory of 2668 2776 kernel32.exe 38 PID 2776 wrote to memory of 2668 2776 kernel32.exe 38 PID 2776 wrote to memory of 2668 2776 kernel32.exe 38 PID 2668 wrote to memory of 2424 2668 kernel32.exe 39 PID 2668 wrote to memory of 2424 2668 kernel32.exe 39 PID 2668 wrote to memory of 2424 2668 kernel32.exe 39 PID 2668 wrote to memory of 2424 2668 kernel32.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\kernel32.exeC:\Windows\system32\kernel32.exe 660 "C:\Users\Admin\AppData\Local\Temp\e1f9aa091985cd7b59432ccbb1b7fd34_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\kernel32.exeC:\Windows\system32\kernel32.exe 704 "C:\Windows\SysWOW64\kernel32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\kernel32.exeC:\Windows\system32\kernel32.exe 708 "C:\Windows\SysWOW64\kernel32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\kernel32.exeC:\Windows\system32\kernel32.exe 712 "C:\Windows\SysWOW64\kernel32.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\kernel32.exeC:\Windows\system32\kernel32.exe 716 "C:\Windows\SysWOW64\kernel32.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\kernel32.exeC:\Windows\system32\kernel32.exe 720 "C:\Windows\SysWOW64\kernel32.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\kernel32.exeC:\Windows\system32\kernel32.exe 724 "C:\Windows\SysWOW64\kernel32.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\kernel32.exeC:\Windows\system32\kernel32.exe 728 "C:\Windows\SysWOW64\kernel32.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\kernel32.exeC:\Windows\system32\kernel32.exe 736 "C:\Windows\SysWOW64\kernel32.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\kernel32.exeC:\Windows\system32\kernel32.exe 740 "C:\Windows\SysWOW64\kernel32.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2424
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
625KB
MD5e1f9aa091985cd7b59432ccbb1b7fd34
SHA1529eb56b97d67f1c124512292b2210512ece3c5d
SHA256b6530b4fcd3716cc94bc25ab09c8d34c083145424f4ee34123db41bcb9fe6b8e
SHA512b4c2fe12d34e78903dee25a122faf8d51296c2bc5b9533cca0f632bcefa58c57842ddeb9b04b4ab13b6f27c2ca0065bc211a46127c32bcf4fc898e38d7747231