Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 03:47
Behavioral task
behavioral1
Sample
f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe
-
Size
373KB
-
MD5
f13868ececfbb8b8b653eee6b2b61fc7
-
SHA1
45632264e33c856c5300c921c5a5b46075512ee7
-
SHA256
c6dc200b86ebc07a353f7208aef05e6a27597a1b8ee3be57e8c534f6fc6971da
-
SHA512
da8d9094f7a81d231387337e8375b4ce53909fb7ad9305b1626d1bbdf1c88db68d47412b7062bbb4e75aa242f547a6d1472943b117c1adf77e0ed41d4f04ce41
-
SSDEEP
6144:u070v1sfejKs5NOrD6gWH4/qQDvXY9Imf8+sx/rF2frcwZFyHVPAsWltmXhBp7vm:u0hmNOrD9Wy4Imf8+erScYF181enWxC
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 20 IoCs
pid Process 4640 scan.exe 3288 scan.exe 3912 scan.exe 920 scan.exe 1056 scan.exe 4116 scan.exe 1820 scan.exe 2668 scan.exe 4060 scan.exe 4476 scan.exe 2120 scan.exe 4596 scan.exe 60 scan.exe 1268 scan.exe 2040 scan.exe 4796 scan.exe 2844 scan.exe 3992 scan.exe 2676 scan.exe 1384 scan.exe -
resource yara_rule behavioral2/memory/1824-0-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/1824-7-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/files/0x00080000000234be-12.dat upx behavioral2/memory/4640-25-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/3912-36-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/1056-48-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/1820-59-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/4060-72-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/2120-81-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/60-92-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/2040-103-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/2844-114-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral2/memory/2676-124-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File opened for modification C:\Windows\SysWOW64\scan.exe scan.exe File created C:\Windows\SysWOW64\scan.exe scan.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 1824 set thread context of 2880 1824 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 82 PID 4640 set thread context of 3288 4640 scan.exe 84 PID 3912 set thread context of 920 3912 scan.exe 93 PID 1056 set thread context of 4116 1056 scan.exe 96 PID 1820 set thread context of 2668 1820 scan.exe 99 PID 4060 set thread context of 4476 4060 scan.exe 101 PID 2120 set thread context of 4596 2120 scan.exe 103 PID 60 set thread context of 1268 60 scan.exe 105 PID 2040 set thread context of 4796 2040 scan.exe 107 PID 2844 set thread context of 3992 2844 scan.exe 109 PID 2676 set thread context of 1384 2676 scan.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 1824 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 4640 scan.exe 3912 scan.exe 1056 scan.exe 1820 scan.exe 4060 scan.exe 2120 scan.exe 60 scan.exe 2040 scan.exe 2844 scan.exe 2676 scan.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1824 wrote to memory of 2880 1824 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 82 PID 1824 wrote to memory of 2880 1824 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 82 PID 1824 wrote to memory of 2880 1824 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 82 PID 1824 wrote to memory of 2880 1824 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 82 PID 1824 wrote to memory of 2880 1824 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 82 PID 1824 wrote to memory of 2880 1824 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 82 PID 1824 wrote to memory of 2880 1824 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 82 PID 1824 wrote to memory of 2880 1824 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 82 PID 1824 wrote to memory of 2880 1824 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 82 PID 1824 wrote to memory of 2880 1824 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 82 PID 1824 wrote to memory of 2880 1824 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 82 PID 2880 wrote to memory of 4640 2880 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 83 PID 2880 wrote to memory of 4640 2880 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 83 PID 2880 wrote to memory of 4640 2880 f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe 83 PID 4640 wrote to memory of 3288 4640 scan.exe 84 PID 4640 wrote to memory of 3288 4640 scan.exe 84 PID 4640 wrote to memory of 3288 4640 scan.exe 84 PID 4640 wrote to memory of 3288 4640 scan.exe 84 PID 4640 wrote to memory of 3288 4640 scan.exe 84 PID 4640 wrote to memory of 3288 4640 scan.exe 84 PID 4640 wrote to memory of 3288 4640 scan.exe 84 PID 4640 wrote to memory of 3288 4640 scan.exe 84 PID 4640 wrote to memory of 3288 4640 scan.exe 84 PID 4640 wrote to memory of 3288 4640 scan.exe 84 PID 4640 wrote to memory of 3288 4640 scan.exe 84 PID 3288 wrote to memory of 3912 3288 scan.exe 92 PID 3288 wrote to memory of 3912 3288 scan.exe 92 PID 3288 wrote to memory of 3912 3288 scan.exe 92 PID 3912 wrote to memory of 920 3912 scan.exe 93 PID 3912 wrote to memory of 920 3912 scan.exe 93 PID 3912 wrote to memory of 920 3912 scan.exe 93 PID 3912 wrote to memory of 920 3912 scan.exe 93 PID 3912 wrote to memory of 920 3912 scan.exe 93 PID 3912 wrote to memory of 920 3912 scan.exe 93 PID 3912 wrote to memory of 920 3912 scan.exe 93 PID 3912 wrote to memory of 920 3912 scan.exe 93 PID 3912 wrote to memory of 920 3912 scan.exe 93 PID 3912 wrote to memory of 920 3912 scan.exe 93 PID 3912 wrote to memory of 920 3912 scan.exe 93 PID 920 wrote to memory of 1056 920 scan.exe 95 PID 920 wrote to memory of 1056 920 scan.exe 95 PID 920 wrote to memory of 1056 920 scan.exe 95 PID 1056 wrote to memory of 4116 1056 scan.exe 96 PID 1056 wrote to memory of 4116 1056 scan.exe 96 PID 1056 wrote to memory of 4116 1056 scan.exe 96 PID 1056 wrote to memory of 4116 1056 scan.exe 96 PID 1056 wrote to memory of 4116 1056 scan.exe 96 PID 1056 wrote to memory of 4116 1056 scan.exe 96 PID 1056 wrote to memory of 4116 1056 scan.exe 96 PID 1056 wrote to memory of 4116 1056 scan.exe 96 PID 1056 wrote to memory of 4116 1056 scan.exe 96 PID 1056 wrote to memory of 4116 1056 scan.exe 96 PID 1056 wrote to memory of 4116 1056 scan.exe 96 PID 4116 wrote to memory of 1820 4116 scan.exe 98 PID 4116 wrote to memory of 1820 4116 scan.exe 98 PID 4116 wrote to memory of 1820 4116 scan.exe 98 PID 1820 wrote to memory of 2668 1820 scan.exe 99 PID 1820 wrote to memory of 2668 1820 scan.exe 99 PID 1820 wrote to memory of 2668 1820 scan.exe 99 PID 1820 wrote to memory of 2668 1820 scan.exe 99 PID 1820 wrote to memory of 2668 1820 scan.exe 99 PID 1820 wrote to memory of 2668 1820 scan.exe 99 PID 1820 wrote to memory of 2668 1820 scan.exe 99 PID 1820 wrote to memory of 2668 1820 scan.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 1120 "C:\Users\Admin\AppData\Local\Temp\f13868ececfbb8b8b653eee6b2b61fc7_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4640 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 1148 "C:\Windows\SysWOW64\scan.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 1120 "C:\Windows\SysWOW64\scan.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 1120 "C:\Windows\SysWOW64\scan.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2668 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 1120 "C:\Windows\SysWOW64\scan.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4060 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 1120 "C:\Windows\SysWOW64\scan.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2120 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4596 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 1124 "C:\Windows\SysWOW64\scan.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:60 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1268 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 1120 "C:\Windows\SysWOW64\scan.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2040 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4796 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 1124 "C:\Windows\SysWOW64\scan.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3992 -
C:\Windows\SysWOW64\scan.exeC:\Windows\system32\scan.exe 1120 "C:\Windows\SysWOW64\scan.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2676 -
C:\Windows\SysWOW64\scan.exeC:\Windows\SysWOW64\scan.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1384
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
373KB
MD5f13868ececfbb8b8b653eee6b2b61fc7
SHA145632264e33c856c5300c921c5a5b46075512ee7
SHA256c6dc200b86ebc07a353f7208aef05e6a27597a1b8ee3be57e8c534f6fc6971da
SHA512da8d9094f7a81d231387337e8375b4ce53909fb7ad9305b1626d1bbdf1c88db68d47412b7062bbb4e75aa242f547a6d1472943b117c1adf77e0ed41d4f04ce41