Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 03:47
Behavioral task
behavioral1
Sample
f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe
-
Size
373KB
-
MD5
f13868ececfbb8b8b653eee6b2b61fc7
-
SHA1
45632264e33c856c5300c921c5a5b46075512ee7
-
SHA256
c6dc200b86ebc07a353f7208aef05e6a27597a1b8ee3be57e8c534f6fc6971da
-
SHA512
da8d9094f7a81d231387337e8375b4ce53909fb7ad9305b1626d1bbdf1c88db68d47412b7062bbb4e75aa242f547a6d1472943b117c1adf77e0ed41d4f04ce41
-
SSDEEP
6144:u070v1sfejKs5NOrD6gWH4/qQDvXY9Imf8+sx/rF2frcwZFyHVPAsWltmXhBp7vm:u0hmNOrD9Wy4Imf8+erScYF181enWxC
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 20 IoCs
pid Process 792 scan.exe 2804 scan.exe 2744 scan.exe 2780 scan.exe 2020 scan.exe 2176 scan.exe 1936 scan.exe 1028 scan.exe 2044 scan.exe 2196 scan.exe 2208 scan.exe 840 scan.exe 1728 scan.exe 628 scan.exe 2304 scan.exe 2384 scan.exe 1784 scan.exe 1852 scan.exe 2396 scan.exe 2996 scan.exe -
Loads dropped DLL 21 IoCs
pid Process 1940 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 1940 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 792 scan.exe 2804 scan.exe 2804 scan.exe 2780 scan.exe 2780 scan.exe 2176 scan.exe 2176 scan.exe 1028 scan.exe 1028 scan.exe 2196 scan.exe 2196 scan.exe 840 scan.exe 840 scan.exe 628 scan.exe 628 scan.exe 2384 scan.exe 2384 scan.exe 1852 scan.exe 1852 scan.exe -
resource yara_rule behavioral1/memory/2072-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2072-9-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/files/0x0007000000012119-13.dat upx behavioral1/memory/1940-14-0x00000000003E0000-0x00000000003F6000-memory.dmp upx behavioral1/memory/792-21-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/792-35-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2744-48-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2020-63-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1936-77-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2044-93-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2208-107-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1728-121-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2304-136-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1784-151-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2396-166-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in System32 directory 32 IoCs
description ioc Process File created C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2072 set thread context of 1940 2072 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 31 PID 792 set thread context of 2804 792 scan.exe 33 PID 2744 set thread context of 2780 2744 scan.exe 35 PID 2020 set thread context of 2176 2020 scan.exe 37 PID 1936 set thread context of 1028 1936 scan.exe 39 PID 2044 set thread context of 2196 2044 scan.exe 41 PID 2208 set thread context of 840 2208 scan.exe 43 PID 1728 set thread context of 628 1728 scan.exe 46 PID 2304 set thread context of 2384 2304 scan.exe 48 PID 1784 set thread context of 1852 1784 scan.exe 50 PID 2396 set thread context of 2996 2396 scan.exe 52 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2072 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 792 scan.exe 2744 scan.exe 2020 scan.exe 1936 scan.exe 2044 scan.exe 2208 scan.exe 1728 scan.exe 2304 scan.exe 1784 scan.exe 2396 scan.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 1940 2072 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 31 PID 2072 wrote to memory of 1940 2072 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 31 PID 2072 wrote to memory of 1940 2072 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 31 PID 2072 wrote to memory of 1940 2072 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 31 PID 2072 wrote to memory of 1940 2072 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 31 PID 2072 wrote to memory of 1940 2072 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 31 PID 2072 wrote to memory of 1940 2072 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 31 PID 2072 wrote to memory of 1940 2072 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 31 PID 2072 wrote to memory of 1940 2072 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 31 PID 2072 wrote to memory of 1940 2072 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 31 PID 2072 wrote to memory of 1940 2072 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 31 PID 2072 wrote to memory of 1940 2072 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 31 PID 1940 wrote to memory of 792 1940 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 32 PID 1940 wrote to memory of 792 1940 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 32 PID 1940 wrote to memory of 792 1940 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 32 PID 1940 wrote to memory of 792 1940 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 32 PID 792 wrote to memory of 2804 792 scan.exe 33 PID 792 wrote to memory of 2804 792 scan.exe 33 PID 792 wrote to memory of 2804 792 scan.exe 33 PID 792 wrote to memory of 2804 792 scan.exe 33 PID 792 wrote to memory of 2804 792 scan.exe 33 PID 792 wrote to memory of 2804 792 scan.exe 33 PID 792 wrote to memory of 2804 792 scan.exe 33 PID 792 wrote to memory of 2804 792 scan.exe 33 PID 792 wrote to memory of 2804 792 scan.exe 33 PID 792 wrote to memory of 2804 792 scan.exe 33 PID 792 wrote to memory of 2804 792 scan.exe 33 PID 792 wrote to memory of 2804 792 scan.exe 33 PID 2804 wrote to memory of 2744 2804 scan.exe 34 PID 2804 wrote to memory of 2744 2804 scan.exe 34 PID 2804 wrote to memory of 2744 2804 scan.exe 34 PID 2804 wrote to memory of 2744 2804 scan.exe 34 PID 2744 wrote to memory of 2780 2744 scan.exe 35 PID 2744 wrote to memory of 2780 2744 scan.exe 35 PID 2744 wrote to memory of 2780 2744 scan.exe 35 PID 2744 wrote to memory of 2780 2744 scan.exe 35 PID 2744 wrote to memory of 2780 2744 scan.exe 35 PID 2744 wrote to memory of 2780 2744 scan.exe 35 PID 2744 wrote to memory of 2780 2744 scan.exe 35 PID 2744 wrote to memory of 2780 2744 scan.exe 35 PID 2744 wrote to memory of 2780 2744 scan.exe 35 PID 2744 wrote to memory of 2780 2744 scan.exe 35 PID 2744 wrote to memory of 2780 2744 scan.exe 35 PID 2744 wrote to memory of 2780 2744 scan.exe 35 PID 2780 wrote to memory of 2020 2780 scan.exe 36 PID 2780 wrote to memory of 2020 2780 scan.exe 36 PID 2780 wrote to memory of 2020 2780 scan.exe 36 PID 2780 wrote to memory of 2020 2780 scan.exe 36 PID 2020 wrote to memory of 2176 2020 scan.exe 37 PID 2020 wrote to memory of 2176 2020 scan.exe 37 PID 2020 wrote to memory of 2176 2020 scan.exe 37 PID 2020 wrote to memory of 2176 2020 scan.exe 37 PID 2020 wrote to memory of 2176 2020 scan.exe 37 PID 2020 wrote to memory of 2176 2020 scan.exe 37 PID 2020 wrote to memory of 2176 2020 scan.exe 37 PID 2020 wrote to memory of 2176 2020 scan.exe 37 PID 2020 wrote to memory of 2176 2020 scan.exe 37 PID 2020 wrote to memory of 2176 2020 scan.exe 37 PID 2020 wrote to memory of 2176 2020 scan.exe 37 PID 2020 wrote to memory of 2176 2020 scan.exe 37 PID 2176 wrote to memory of 1936 2176 scan.exe 38 PID 2176 wrote to memory of 1936 2176 scan.exe 38 PID 2176 wrote to memory of 1936 2176 scan.exe 38 PID 2176 wrote to memory of 1936 2176 scan.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 468 "C:\Users\Admin\AppData\Local\Temp\f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 528 "C:\Windows\SysWOW64\scan.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 524 "C:\Windows\SysWOW64\scan.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 524 "C:\Windows\SysWOW64\scan.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1936 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 532 "C:\Windows\SysWOW64\scan.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2044 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 528 "C:\Windows\SysWOW64\scan.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 532 "C:\Windows\SysWOW64\scan.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1728 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:628 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 524 "C:\Windows\SysWOW64\scan.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2384 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 524 "C:\Windows\SysWOW64\scan.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1784 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1852 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 524 "C:\Windows\SysWOW64\scan.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2996
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD5f13868ececfbb8b8b653eee6b2b61fc7
SHA145632264e33c856c5300c921c5a5b46075512ee7
SHA256c6dc200b86ebc07a353f7208aef05e6a27597a1b8ee3be57e8c534f6fc6971da
SHA512da8d9094f7a81d231387337e8375b4ce53909fb7ad9305b1626d1bbdf1c88db68d47412b7062bbb4e75aa242f547a6d1472943b117c1adf77e0ed41d4f04ce41