Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-09-2024 09:27
Static task
static1
Behavioral task
behavioral1
Sample
e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe
-
Size
121KB
-
MD5
e4793601cffb3ba161163909ea2de0af
-
SHA1
b7ff4bb12452f08d81c224dd0c3567166af0c6b9
-
SHA256
de615be1170b2dcd3693bad48e969c66e9068209aa06aff543daa81ea69945ec
-
SHA512
d148fdb8c0d6fa95aaaf3a7c7c6e575cffa74ef90c180e6480aa513def607535bffb88204d5c65d94effefeacb529c4b34794cc7c66ee405afa91228e830c30a
-
SSDEEP
3072:Ns0uSyTn8AwXzcYeY69t8KEAIKelkMkLLSHmI:O0udz8dDd6VEA+6MwuHn
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 10 IoCs
pid Process 3056 upgradei.exe 2616 upgradei.exe 2520 upgradei.exe 696 upgradei.exe 2592 upgradei.exe 1740 upgradei.exe 1304 upgradei.exe 2360 upgradei.exe 2468 upgradei.exe 1512 upgradei.exe -
Loads dropped DLL 20 IoCs
pid Process 800 e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe 800 e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe 3056 upgradei.exe 3056 upgradei.exe 2616 upgradei.exe 2616 upgradei.exe 2520 upgradei.exe 2520 upgradei.exe 696 upgradei.exe 696 upgradei.exe 2592 upgradei.exe 2592 upgradei.exe 1740 upgradei.exe 1740 upgradei.exe 1304 upgradei.exe 1304 upgradei.exe 2360 upgradei.exe 2360 upgradei.exe 2468 upgradei.exe 2468 upgradei.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\upgradei.exe e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\upgradei.exe upgradei.exe File opened for modification C:\Windows\SysWOW64\upgradei.exe upgradei.exe File created C:\Windows\SysWOW64\upgradei.exe upgradei.exe File created C:\Windows\SysWOW64\upgradei.exe upgradei.exe File opened for modification C:\Windows\SysWOW64\upgradei.exe upgradei.exe File opened for modification C:\Windows\SysWOW64\upgradei.exe upgradei.exe File created C:\Windows\SysWOW64\upgradei.exe upgradei.exe File opened for modification C:\Windows\SysWOW64\upgradei.exe upgradei.exe File created C:\Windows\SysWOW64\upgradei.exe upgradei.exe File created C:\Windows\SysWOW64\upgradei.exe upgradei.exe File created C:\Windows\SysWOW64\upgradei.exe upgradei.exe File created C:\Windows\SysWOW64\upgradei.exe upgradei.exe File opened for modification C:\Windows\SysWOW64\upgradei.exe upgradei.exe File created C:\Windows\SysWOW64\upgradei.exe upgradei.exe File created C:\Windows\SysWOW64\upgradei.exe upgradei.exe File opened for modification C:\Windows\SysWOW64\upgradei.exe upgradei.exe File created C:\Windows\SysWOW64\upgradei.exe e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\upgradei.exe upgradei.exe File opened for modification C:\Windows\SysWOW64\upgradei.exe upgradei.exe File created C:\Windows\SysWOW64\upgradei.exe upgradei.exe File opened for modification C:\Windows\SysWOW64\upgradei.exe upgradei.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 800 e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe 3056 upgradei.exe 2616 upgradei.exe 2520 upgradei.exe 696 upgradei.exe 2592 upgradei.exe 1740 upgradei.exe 1304 upgradei.exe 2360 upgradei.exe 2468 upgradei.exe 1512 upgradei.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upgradei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upgradei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upgradei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upgradei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upgradei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upgradei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upgradei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upgradei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upgradei.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language upgradei.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 800 wrote to memory of 3056 800 e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe 28 PID 800 wrote to memory of 3056 800 e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe 28 PID 800 wrote to memory of 3056 800 e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe 28 PID 800 wrote to memory of 3056 800 e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe 28 PID 3056 wrote to memory of 2616 3056 upgradei.exe 29 PID 3056 wrote to memory of 2616 3056 upgradei.exe 29 PID 3056 wrote to memory of 2616 3056 upgradei.exe 29 PID 3056 wrote to memory of 2616 3056 upgradei.exe 29 PID 2616 wrote to memory of 2520 2616 upgradei.exe 30 PID 2616 wrote to memory of 2520 2616 upgradei.exe 30 PID 2616 wrote to memory of 2520 2616 upgradei.exe 30 PID 2616 wrote to memory of 2520 2616 upgradei.exe 30 PID 2520 wrote to memory of 696 2520 upgradei.exe 33 PID 2520 wrote to memory of 696 2520 upgradei.exe 33 PID 2520 wrote to memory of 696 2520 upgradei.exe 33 PID 2520 wrote to memory of 696 2520 upgradei.exe 33 PID 696 wrote to memory of 2592 696 upgradei.exe 34 PID 696 wrote to memory of 2592 696 upgradei.exe 34 PID 696 wrote to memory of 2592 696 upgradei.exe 34 PID 696 wrote to memory of 2592 696 upgradei.exe 34 PID 2592 wrote to memory of 1740 2592 upgradei.exe 35 PID 2592 wrote to memory of 1740 2592 upgradei.exe 35 PID 2592 wrote to memory of 1740 2592 upgradei.exe 35 PID 2592 wrote to memory of 1740 2592 upgradei.exe 35 PID 1740 wrote to memory of 1304 1740 upgradei.exe 36 PID 1740 wrote to memory of 1304 1740 upgradei.exe 36 PID 1740 wrote to memory of 1304 1740 upgradei.exe 36 PID 1740 wrote to memory of 1304 1740 upgradei.exe 36 PID 1304 wrote to memory of 2360 1304 upgradei.exe 37 PID 1304 wrote to memory of 2360 1304 upgradei.exe 37 PID 1304 wrote to memory of 2360 1304 upgradei.exe 37 PID 1304 wrote to memory of 2360 1304 upgradei.exe 37 PID 2360 wrote to memory of 2468 2360 upgradei.exe 38 PID 2360 wrote to memory of 2468 2360 upgradei.exe 38 PID 2360 wrote to memory of 2468 2360 upgradei.exe 38 PID 2360 wrote to memory of 2468 2360 upgradei.exe 38 PID 2468 wrote to memory of 1512 2468 upgradei.exe 39 PID 2468 wrote to memory of 1512 2468 upgradei.exe 39 PID 2468 wrote to memory of 1512 2468 upgradei.exe 39 PID 2468 wrote to memory of 1512 2468 upgradei.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:800 -
C:\Windows\SysWOW64\upgradei.exeC:\Windows\system32\upgradei.exe 524 "C:\Users\Admin\AppData\Local\Temp\e4793601cffb3ba161163909ea2de0af_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\upgradei.exeC:\Windows\system32\upgradei.exe 528 "C:\Windows\SysWOW64\upgradei.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\upgradei.exeC:\Windows\system32\upgradei.exe 540 "C:\Windows\SysWOW64\upgradei.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\upgradei.exeC:\Windows\system32\upgradei.exe 532 "C:\Windows\SysWOW64\upgradei.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\SysWOW64\upgradei.exeC:\Windows\system32\upgradei.exe 548 "C:\Windows\SysWOW64\upgradei.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\upgradei.exeC:\Windows\system32\upgradei.exe 536 "C:\Windows\SysWOW64\upgradei.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\upgradei.exeC:\Windows\system32\upgradei.exe 556 "C:\Windows\SysWOW64\upgradei.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\upgradei.exeC:\Windows\system32\upgradei.exe 552 "C:\Windows\SysWOW64\upgradei.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\upgradei.exeC:\Windows\system32\upgradei.exe 564 "C:\Windows\SysWOW64\upgradei.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\upgradei.exeC:\Windows\system32\upgradei.exe 544 "C:\Windows\SysWOW64\upgradei.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
PID:1512
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
121KB
MD5e4793601cffb3ba161163909ea2de0af
SHA1b7ff4bb12452f08d81c224dd0c3567166af0c6b9
SHA256de615be1170b2dcd3693bad48e969c66e9068209aa06aff543daa81ea69945ec
SHA512d148fdb8c0d6fa95aaaf3a7c7c6e575cffa74ef90c180e6480aa513def607535bffb88204d5c65d94effefeacb529c4b34794cc7c66ee405afa91228e830c30a