Analysis
-
max time kernel
138s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 19:37
Static task
static1
Behavioral task
behavioral1
Sample
ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe
-
Size
152KB
-
MD5
ee49d6f49490ad98a6eda7ca6a93e9c3
-
SHA1
693d7773436fbc79c404721a3228036fdd862c30
-
SHA256
eebde709fb575f25dc0440d7b493d94db7312f77689c2872a1a86c24c55a35ef
-
SHA512
b6069cffe146870ce750b965d411c7e58a3d7bd6eafd93f700a308e0dc06a4d9081f81e21d44b771f9d895331b7fd25f5e6b56ad6e02fb8892404f000e1c457a
-
SSDEEP
3072:fi6XBulAuDQaj0et2Q5BvcGDKKo3n114RHGE3gVLKLVX:f3xulTEGt2Qfvc1114RHGVVYd
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 20 IoCs
pid Process 2752 Sysctrls.exe 2664 Sysctrls.exe 2596 Sysctrls.exe 2600 Sysctrls.exe 3056 Sysctrls.exe 2104 Sysctrls.exe 2448 Sysctrls.exe 2360 Sysctrls.exe 640 Sysctrls.exe 2824 Sysctrls.exe 2936 Sysctrls.exe 2368 Sysctrls.exe 2176 Sysctrls.exe 1120 Sysctrls.exe 1936 Sysctrls.exe 2952 Sysctrls.exe 2172 Sysctrls.exe 2152 Sysctrls.exe 860 Sysctrls.exe 892 Sysctrls.exe -
Loads dropped DLL 21 IoCs
pid Process 2888 ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe 2888 ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe 2752 Sysctrls.exe 2664 Sysctrls.exe 2664 Sysctrls.exe 2600 Sysctrls.exe 2600 Sysctrls.exe 2104 Sysctrls.exe 2104 Sysctrls.exe 2360 Sysctrls.exe 2360 Sysctrls.exe 2824 Sysctrls.exe 2824 Sysctrls.exe 2368 Sysctrls.exe 2368 Sysctrls.exe 1120 Sysctrls.exe 1120 Sysctrls.exe 2952 Sysctrls.exe 2952 Sysctrls.exe 2152 Sysctrls.exe 2152 Sysctrls.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File opened for modification C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File opened for modification C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File opened for modification C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File created C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File opened for modification C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File opened for modification C:\Windows\SysWOW64\Sysctrls.exe ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File created C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File created C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File opened for modification C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File opened for modification C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File created C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File opened for modification C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File created C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File created C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File opened for modification C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File created C:\Windows\SysWOW64\Sysctrls.exe ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe File created C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File created C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File created C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe File opened for modification C:\Windows\SysWOW64\Sysctrls.exe Sysctrls.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2644 set thread context of 2888 2644 ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe 31 PID 2752 set thread context of 2664 2752 Sysctrls.exe 33 PID 2596 set thread context of 2600 2596 Sysctrls.exe 35 PID 3056 set thread context of 2104 3056 Sysctrls.exe 37 PID 2448 set thread context of 2360 2448 Sysctrls.exe 39 PID 640 set thread context of 2824 640 Sysctrls.exe 41 PID 2936 set thread context of 2368 2936 Sysctrls.exe 43 PID 2176 set thread context of 1120 2176 Sysctrls.exe 45 PID 1936 set thread context of 2952 1936 Sysctrls.exe 48 PID 2172 set thread context of 2152 2172 Sysctrls.exe 50 PID 860 set thread context of 892 860 Sysctrls.exe 52 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sysctrls.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2644 ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe 2752 Sysctrls.exe 2596 Sysctrls.exe 3056 Sysctrls.exe 2448 Sysctrls.exe 640 Sysctrls.exe 2936 Sysctrls.exe 2176 Sysctrls.exe 1936 Sysctrls.exe 2172 Sysctrls.exe 860 Sysctrls.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2644 wrote to memory of 2888 2644 ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe 31 PID 2644 wrote to memory of 2888 2644 ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe 31 PID 2644 wrote to memory of 2888 2644 ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe 31 PID 2644 wrote to memory of 2888 2644 ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe 31 PID 2644 wrote to memory of 2888 2644 ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe 31 PID 2644 wrote to memory of 2888 2644 ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe 31 PID 2888 wrote to memory of 2752 2888 ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe 32 PID 2888 wrote to memory of 2752 2888 ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe 32 PID 2888 wrote to memory of 2752 2888 ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe 32 PID 2888 wrote to memory of 2752 2888 ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe 32 PID 2752 wrote to memory of 2664 2752 Sysctrls.exe 33 PID 2752 wrote to memory of 2664 2752 Sysctrls.exe 33 PID 2752 wrote to memory of 2664 2752 Sysctrls.exe 33 PID 2752 wrote to memory of 2664 2752 Sysctrls.exe 33 PID 2752 wrote to memory of 2664 2752 Sysctrls.exe 33 PID 2752 wrote to memory of 2664 2752 Sysctrls.exe 33 PID 2664 wrote to memory of 2596 2664 Sysctrls.exe 34 PID 2664 wrote to memory of 2596 2664 Sysctrls.exe 34 PID 2664 wrote to memory of 2596 2664 Sysctrls.exe 34 PID 2664 wrote to memory of 2596 2664 Sysctrls.exe 34 PID 2596 wrote to memory of 2600 2596 Sysctrls.exe 35 PID 2596 wrote to memory of 2600 2596 Sysctrls.exe 35 PID 2596 wrote to memory of 2600 2596 Sysctrls.exe 35 PID 2596 wrote to memory of 2600 2596 Sysctrls.exe 35 PID 2596 wrote to memory of 2600 2596 Sysctrls.exe 35 PID 2596 wrote to memory of 2600 2596 Sysctrls.exe 35 PID 2600 wrote to memory of 3056 2600 Sysctrls.exe 36 PID 2600 wrote to memory of 3056 2600 Sysctrls.exe 36 PID 2600 wrote to memory of 3056 2600 Sysctrls.exe 36 PID 2600 wrote to memory of 3056 2600 Sysctrls.exe 36 PID 3056 wrote to memory of 2104 3056 Sysctrls.exe 37 PID 3056 wrote to memory of 2104 3056 Sysctrls.exe 37 PID 3056 wrote to memory of 2104 3056 Sysctrls.exe 37 PID 3056 wrote to memory of 2104 3056 Sysctrls.exe 37 PID 3056 wrote to memory of 2104 3056 Sysctrls.exe 37 PID 3056 wrote to memory of 2104 3056 Sysctrls.exe 37 PID 2104 wrote to memory of 2448 2104 Sysctrls.exe 38 PID 2104 wrote to memory of 2448 2104 Sysctrls.exe 38 PID 2104 wrote to memory of 2448 2104 Sysctrls.exe 38 PID 2104 wrote to memory of 2448 2104 Sysctrls.exe 38 PID 2448 wrote to memory of 2360 2448 Sysctrls.exe 39 PID 2448 wrote to memory of 2360 2448 Sysctrls.exe 39 PID 2448 wrote to memory of 2360 2448 Sysctrls.exe 39 PID 2448 wrote to memory of 2360 2448 Sysctrls.exe 39 PID 2448 wrote to memory of 2360 2448 Sysctrls.exe 39 PID 2448 wrote to memory of 2360 2448 Sysctrls.exe 39 PID 2360 wrote to memory of 640 2360 Sysctrls.exe 40 PID 2360 wrote to memory of 640 2360 Sysctrls.exe 40 PID 2360 wrote to memory of 640 2360 Sysctrls.exe 40 PID 2360 wrote to memory of 640 2360 Sysctrls.exe 40 PID 640 wrote to memory of 2824 640 Sysctrls.exe 41 PID 640 wrote to memory of 2824 640 Sysctrls.exe 41 PID 640 wrote to memory of 2824 640 Sysctrls.exe 41 PID 640 wrote to memory of 2824 640 Sysctrls.exe 41 PID 640 wrote to memory of 2824 640 Sysctrls.exe 41 PID 640 wrote to memory of 2824 640 Sysctrls.exe 41 PID 2824 wrote to memory of 2936 2824 Sysctrls.exe 42 PID 2824 wrote to memory of 2936 2824 Sysctrls.exe 42 PID 2824 wrote to memory of 2936 2824 Sysctrls.exe 42 PID 2824 wrote to memory of 2936 2824 Sysctrls.exe 42 PID 2936 wrote to memory of 2368 2936 Sysctrls.exe 43 PID 2936 wrote to memory of 2368 2936 Sysctrls.exe 43 PID 2936 wrote to memory of 2368 2936 Sysctrls.exe 43 PID 2936 wrote to memory of 2368 2936 Sysctrls.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\Sysctrls.exeC:\Windows\system32\Sysctrls.exe 432 "C:\Users\Admin\AppData\Local\Temp\ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\Sysctrls.exe432 C:\Users\Admin\AppData\Local\Temp\ee49d6f49490ad98a6eda7ca6a93e9c3_JaffaCakes118.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\Sysctrls.exeC:\Windows\system32\Sysctrls.exe 504 "C:\Windows\SysWOW64\Sysctrls.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\Sysctrls.exe504 C:\Windows\SysWOW64\Sysctrls.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\Sysctrls.exeC:\Windows\system32\Sysctrls.exe 504 "C:\Windows\SysWOW64\Sysctrls.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\Sysctrls.exe504 C:\Windows\SysWOW64\Sysctrls.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\Sysctrls.exeC:\Windows\system32\Sysctrls.exe 508 "C:\Windows\SysWOW64\Sysctrls.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\Sysctrls.exe508 C:\Windows\SysWOW64\Sysctrls.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\Sysctrls.exeC:\Windows\system32\Sysctrls.exe 508 "C:\Windows\SysWOW64\Sysctrls.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\SysWOW64\Sysctrls.exe508 C:\Windows\SysWOW64\Sysctrls.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\Sysctrls.exeC:\Windows\system32\Sysctrls.exe 504 "C:\Windows\SysWOW64\Sysctrls.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\Sysctrls.exe504 C:\Windows\SysWOW64\Sysctrls.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\Sysctrls.exeC:\Windows\system32\Sysctrls.exe 504 "C:\Windows\SysWOW64\Sysctrls.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Windows\SysWOW64\Sysctrls.exe504 C:\Windows\SysWOW64\Sysctrls.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1120 -
C:\Windows\SysWOW64\Sysctrls.exeC:\Windows\system32\Sysctrls.exe 504 "C:\Windows\SysWOW64\Sysctrls.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\Sysctrls.exe504 C:\Windows\SysWOW64\Sysctrls.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Windows\SysWOW64\Sysctrls.exeC:\Windows\system32\Sysctrls.exe 512 "C:\Windows\SysWOW64\Sysctrls.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Windows\SysWOW64\Sysctrls.exe512 C:\Windows\SysWOW64\Sysctrls.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Windows\SysWOW64\Sysctrls.exeC:\Windows\system32\Sysctrls.exe 516 "C:\Windows\SysWOW64\Sysctrls.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:860 -
C:\Windows\SysWOW64\Sysctrls.exe516 C:\Windows\SysWOW64\Sysctrls.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:892
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5ee49d6f49490ad98a6eda7ca6a93e9c3
SHA1693d7773436fbc79c404721a3228036fdd862c30
SHA256eebde709fb575f25dc0440d7b493d94db7312f77689c2872a1a86c24c55a35ef
SHA512b6069cffe146870ce750b965d411c7e58a3d7bd6eafd93f700a308e0dc06a4d9081f81e21d44b771f9d895331b7fd25f5e6b56ad6e02fb8892404f000e1c457a