Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20-09-2024 02:54
Behavioral task
behavioral1
Sample
ecb3fb6cabac7484f84184105ab4ad03_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ecb3fb6cabac7484f84184105ab4ad03_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ecb3fb6cabac7484f84184105ab4ad03_JaffaCakes118.exe
-
Size
852KB
-
MD5
ecb3fb6cabac7484f84184105ab4ad03
-
SHA1
4e01872b5afdc16d1b18e1f650cbefa67d9ffbc5
-
SHA256
b0e184242cd2daafaf9f756b2140b0ea432ea733d66fdb03f1a0018ed28170e1
-
SHA512
4c46d96745e1a0e23ec3b6b8edc1c1808e5a8ca91de7e636d91bf11849dd74c862aad6e9dba1de031e3b4087cb007782accf781c6672d81bc3b5f8f232914d7b
-
SSDEEP
12288:HE+NLeE1PYEPZ0Vy3F4fjElBjIq2KKn/Hz6I:k+xPZ0VQoglFIlNV
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 10 IoCs
pid Process 1960 scvhost.exe 3044 scvhost.exe 2504 scvhost.exe 5072 scvhost.exe 4300 scvhost.exe 456 scvhost.exe 1252 scvhost.exe 4696 scvhost.exe 4368 scvhost.exe 4076 scvhost.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe scvhost.exe File created C:\Windows\SysWOW64\scvhost.exe scvhost.exe File created C:\Windows\SysWOW64\scvhost.exe scvhost.exe File created C:\Windows\SysWOW64\scvhost.exe scvhost.exe File created C:\Windows\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe ecb3fb6cabac7484f84184105ab4ad03_JaffaCakes118.exe File created C:\Windows\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe scvhost.exe File created C:\Windows\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe scvhost.exe File created C:\Windows\SysWOW64\scvhost.exe ecb3fb6cabac7484f84184105ab4ad03_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe scvhost.exe File created C:\Windows\SysWOW64\scvhost.exe scvhost.exe File created C:\Windows\SysWOW64\scvhost.exe scvhost.exe File opened for modification C:\Windows\SysWOW64\scvhost.exe scvhost.exe File created C:\Windows\SysWOW64\scvhost.exe scvhost.exe File created C:\Windows\SysWOW64\scvhost.exe scvhost.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ecb3fb6cabac7484f84184105ab4ad03_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvhost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3064 wrote to memory of 1960 3064 ecb3fb6cabac7484f84184105ab4ad03_JaffaCakes118.exe 82 PID 3064 wrote to memory of 1960 3064 ecb3fb6cabac7484f84184105ab4ad03_JaffaCakes118.exe 82 PID 3064 wrote to memory of 1960 3064 ecb3fb6cabac7484f84184105ab4ad03_JaffaCakes118.exe 82 PID 1960 wrote to memory of 3044 1960 scvhost.exe 90 PID 1960 wrote to memory of 3044 1960 scvhost.exe 90 PID 1960 wrote to memory of 3044 1960 scvhost.exe 90 PID 3044 wrote to memory of 2504 3044 scvhost.exe 92 PID 3044 wrote to memory of 2504 3044 scvhost.exe 92 PID 3044 wrote to memory of 2504 3044 scvhost.exe 92 PID 2504 wrote to memory of 5072 2504 scvhost.exe 94 PID 2504 wrote to memory of 5072 2504 scvhost.exe 94 PID 2504 wrote to memory of 5072 2504 scvhost.exe 94 PID 5072 wrote to memory of 4300 5072 scvhost.exe 95 PID 5072 wrote to memory of 4300 5072 scvhost.exe 95 PID 5072 wrote to memory of 4300 5072 scvhost.exe 95 PID 4300 wrote to memory of 456 4300 scvhost.exe 96 PID 4300 wrote to memory of 456 4300 scvhost.exe 96 PID 4300 wrote to memory of 456 4300 scvhost.exe 96 PID 456 wrote to memory of 1252 456 scvhost.exe 97 PID 456 wrote to memory of 1252 456 scvhost.exe 97 PID 456 wrote to memory of 1252 456 scvhost.exe 97 PID 1252 wrote to memory of 4696 1252 scvhost.exe 98 PID 1252 wrote to memory of 4696 1252 scvhost.exe 98 PID 1252 wrote to memory of 4696 1252 scvhost.exe 98 PID 4696 wrote to memory of 4368 4696 scvhost.exe 99 PID 4696 wrote to memory of 4368 4696 scvhost.exe 99 PID 4696 wrote to memory of 4368 4696 scvhost.exe 99 PID 4368 wrote to memory of 4076 4368 scvhost.exe 100 PID 4368 wrote to memory of 4076 4368 scvhost.exe 100 PID 4368 wrote to memory of 4076 4368 scvhost.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\ecb3fb6cabac7484f84184105ab4ad03_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ecb3fb6cabac7484f84184105ab4ad03_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\scvhost.exeC:\Windows\system32\scvhost.exe 1148 "C:\Users\Admin\AppData\Local\Temp\ecb3fb6cabac7484f84184105ab4ad03_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\scvhost.exeC:\Windows\system32\scvhost.exe 1152 "C:\Windows\SysWOW64\scvhost.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\scvhost.exeC:\Windows\system32\scvhost.exe 1136 "C:\Windows\SysWOW64\scvhost.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\scvhost.exeC:\Windows\system32\scvhost.exe 1124 "C:\Windows\SysWOW64\scvhost.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\SysWOW64\scvhost.exeC:\Windows\system32\scvhost.exe 1092 "C:\Windows\SysWOW64\scvhost.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\scvhost.exeC:\Windows\system32\scvhost.exe 1128 "C:\Windows\SysWOW64\scvhost.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Windows\SysWOW64\scvhost.exeC:\Windows\system32\scvhost.exe 1132 "C:\Windows\SysWOW64\scvhost.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\scvhost.exeC:\Windows\system32\scvhost.exe 1140 "C:\Windows\SysWOW64\scvhost.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\SysWOW64\scvhost.exeC:\Windows\system32\scvhost.exe 1144 "C:\Windows\SysWOW64\scvhost.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\SysWOW64\scvhost.exeC:\Windows\system32\scvhost.exe 1160 "C:\Windows\SysWOW64\scvhost.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4076
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
852KB
MD5ecb3fb6cabac7484f84184105ab4ad03
SHA14e01872b5afdc16d1b18e1f650cbefa67d9ffbc5
SHA256b0e184242cd2daafaf9f756b2140b0ea432ea733d66fdb03f1a0018ed28170e1
SHA5124c46d96745e1a0e23ec3b6b8edc1c1808e5a8ca91de7e636d91bf11849dd74c862aad6e9dba1de031e3b4087cb007782accf781c6672d81bc3b5f8f232914d7b