Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe
-
Size
133KB
-
MD5
f16800dea64522d686d88e67c7b02597
-
SHA1
69659552cc08c3be06edb77d32bed5828663af96
-
SHA256
cf3582e4dfed8b6439c40755cd42149fe293d8d766a36b1a881ecbad7c62331f
-
SHA512
a20e6ff79c5b687c72c9a0797bce065c3a42ed1df3b33b2bdbe0d50dbf6db624a8f4b0d3287891d92f45ab1ba2c521ffb209852cd5a1c1355bf3ce5446c6dbf5
-
SSDEEP
3072:EqpGB2uBATxmU7JN7hN6co0KFc5kfm3ly5TP6hLeRS:EqpGBR2xmwn7hhmfAlykoRS
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 10 IoCs
pid Process 1460 sysinfo.exe 2884 sysinfo.exe 1128 sysinfo.exe 980 sysinfo.exe 2940 sysinfo.exe 1536 sysinfo.exe 3036 sysinfo.exe 1040 sysinfo.exe 1980 sysinfo.exe 2064 sysinfo.exe -
Loads dropped DLL 20 IoCs
pid Process 580 f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe 580 f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe 1460 sysinfo.exe 1460 sysinfo.exe 2884 sysinfo.exe 2884 sysinfo.exe 1128 sysinfo.exe 1128 sysinfo.exe 980 sysinfo.exe 980 sysinfo.exe 2940 sysinfo.exe 2940 sysinfo.exe 1536 sysinfo.exe 1536 sysinfo.exe 3036 sysinfo.exe 3036 sysinfo.exe 1040 sysinfo.exe 1040 sysinfo.exe 1980 sysinfo.exe 1980 sysinfo.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\sysinfo.exe f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 580 wrote to memory of 1460 580 f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe 31 PID 580 wrote to memory of 1460 580 f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe 31 PID 580 wrote to memory of 1460 580 f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe 31 PID 580 wrote to memory of 1460 580 f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe 31 PID 1460 wrote to memory of 2884 1460 sysinfo.exe 32 PID 1460 wrote to memory of 2884 1460 sysinfo.exe 32 PID 1460 wrote to memory of 2884 1460 sysinfo.exe 32 PID 1460 wrote to memory of 2884 1460 sysinfo.exe 32 PID 2884 wrote to memory of 1128 2884 sysinfo.exe 33 PID 2884 wrote to memory of 1128 2884 sysinfo.exe 33 PID 2884 wrote to memory of 1128 2884 sysinfo.exe 33 PID 2884 wrote to memory of 1128 2884 sysinfo.exe 33 PID 1128 wrote to memory of 980 1128 sysinfo.exe 34 PID 1128 wrote to memory of 980 1128 sysinfo.exe 34 PID 1128 wrote to memory of 980 1128 sysinfo.exe 34 PID 1128 wrote to memory of 980 1128 sysinfo.exe 34 PID 980 wrote to memory of 2940 980 sysinfo.exe 35 PID 980 wrote to memory of 2940 980 sysinfo.exe 35 PID 980 wrote to memory of 2940 980 sysinfo.exe 35 PID 980 wrote to memory of 2940 980 sysinfo.exe 35 PID 2940 wrote to memory of 1536 2940 sysinfo.exe 36 PID 2940 wrote to memory of 1536 2940 sysinfo.exe 36 PID 2940 wrote to memory of 1536 2940 sysinfo.exe 36 PID 2940 wrote to memory of 1536 2940 sysinfo.exe 36 PID 1536 wrote to memory of 3036 1536 sysinfo.exe 38 PID 1536 wrote to memory of 3036 1536 sysinfo.exe 38 PID 1536 wrote to memory of 3036 1536 sysinfo.exe 38 PID 1536 wrote to memory of 3036 1536 sysinfo.exe 38 PID 3036 wrote to memory of 1040 3036 sysinfo.exe 39 PID 3036 wrote to memory of 1040 3036 sysinfo.exe 39 PID 3036 wrote to memory of 1040 3036 sysinfo.exe 39 PID 3036 wrote to memory of 1040 3036 sysinfo.exe 39 PID 1040 wrote to memory of 1980 1040 sysinfo.exe 40 PID 1040 wrote to memory of 1980 1040 sysinfo.exe 40 PID 1040 wrote to memory of 1980 1040 sysinfo.exe 40 PID 1040 wrote to memory of 1980 1040 sysinfo.exe 40 PID 1980 wrote to memory of 2064 1980 sysinfo.exe 41 PID 1980 wrote to memory of 2064 1980 sysinfo.exe 41 PID 1980 wrote to memory of 2064 1980 sysinfo.exe 41 PID 1980 wrote to memory of 2064 1980 sysinfo.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:580 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 496 "C:\Users\Admin\AppData\Local\Temp\f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 540 "C:\Windows\SysWOW64\sysinfo.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 536 "C:\Windows\SysWOW64\sysinfo.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 528 "C:\Windows\SysWOW64\sysinfo.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 552 "C:\Windows\SysWOW64\sysinfo.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 532 "C:\Windows\SysWOW64\sysinfo.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 568 "C:\Windows\SysWOW64\sysinfo.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 556 "C:\Windows\SysWOW64\sysinfo.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 544 "C:\Windows\SysWOW64\sysinfo.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 548 "C:\Windows\SysWOW64\sysinfo.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2064
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5f16800dea64522d686d88e67c7b02597
SHA169659552cc08c3be06edb77d32bed5828663af96
SHA256cf3582e4dfed8b6439c40755cd42149fe293d8d766a36b1a881ecbad7c62331f
SHA512a20e6ff79c5b687c72c9a0797bce065c3a42ed1df3b33b2bdbe0d50dbf6db624a8f4b0d3287891d92f45ab1ba2c521ffb209852cd5a1c1355bf3ce5446c6dbf5