Analysis
-
max time kernel
147s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
22-09-2024 05:55
Static task
static1
Behavioral task
behavioral1
Sample
f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe
-
Size
133KB
-
MD5
f16800dea64522d686d88e67c7b02597
-
SHA1
69659552cc08c3be06edb77d32bed5828663af96
-
SHA256
cf3582e4dfed8b6439c40755cd42149fe293d8d766a36b1a881ecbad7c62331f
-
SHA512
a20e6ff79c5b687c72c9a0797bce065c3a42ed1df3b33b2bdbe0d50dbf6db624a8f4b0d3287891d92f45ab1ba2c521ffb209852cd5a1c1355bf3ce5446c6dbf5
-
SSDEEP
3072:EqpGB2uBATxmU7JN7hN6co0KFc5kfm3ly5TP6hLeRS:EqpGBR2xmwn7hhmfAlykoRS
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 10 IoCs
pid Process 208 sysinfo.exe 3092 sysinfo.exe 1984 sysinfo.exe 1608 sysinfo.exe 4088 sysinfo.exe 4264 sysinfo.exe 2760 sysinfo.exe 1620 sysinfo.exe 4080 sysinfo.exe 1992 sysinfo.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File opened for modification C:\Windows\SysWOW64\sysinfo.exe f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe File created C:\Windows\SysWOW64\sysinfo.exe sysinfo.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sysinfo.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4780 wrote to memory of 208 4780 f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe 82 PID 4780 wrote to memory of 208 4780 f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe 82 PID 4780 wrote to memory of 208 4780 f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe 82 PID 208 wrote to memory of 3092 208 sysinfo.exe 90 PID 208 wrote to memory of 3092 208 sysinfo.exe 90 PID 208 wrote to memory of 3092 208 sysinfo.exe 90 PID 3092 wrote to memory of 1984 3092 sysinfo.exe 92 PID 3092 wrote to memory of 1984 3092 sysinfo.exe 92 PID 3092 wrote to memory of 1984 3092 sysinfo.exe 92 PID 1984 wrote to memory of 1608 1984 sysinfo.exe 94 PID 1984 wrote to memory of 1608 1984 sysinfo.exe 94 PID 1984 wrote to memory of 1608 1984 sysinfo.exe 94 PID 1608 wrote to memory of 4088 1608 sysinfo.exe 95 PID 1608 wrote to memory of 4088 1608 sysinfo.exe 95 PID 1608 wrote to memory of 4088 1608 sysinfo.exe 95 PID 4088 wrote to memory of 4264 4088 sysinfo.exe 96 PID 4088 wrote to memory of 4264 4088 sysinfo.exe 96 PID 4088 wrote to memory of 4264 4088 sysinfo.exe 96 PID 4264 wrote to memory of 2760 4264 sysinfo.exe 97 PID 4264 wrote to memory of 2760 4264 sysinfo.exe 97 PID 4264 wrote to memory of 2760 4264 sysinfo.exe 97 PID 2760 wrote to memory of 1620 2760 sysinfo.exe 98 PID 2760 wrote to memory of 1620 2760 sysinfo.exe 98 PID 2760 wrote to memory of 1620 2760 sysinfo.exe 98 PID 1620 wrote to memory of 4080 1620 sysinfo.exe 99 PID 1620 wrote to memory of 4080 1620 sysinfo.exe 99 PID 1620 wrote to memory of 4080 1620 sysinfo.exe 99 PID 4080 wrote to memory of 1992 4080 sysinfo.exe 100 PID 4080 wrote to memory of 1992 4080 sysinfo.exe 100 PID 4080 wrote to memory of 1992 4080 sysinfo.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 1032 "C:\Users\Admin\AppData\Local\Temp\f16800dea64522d686d88e67c7b02597_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 1156 "C:\Windows\SysWOW64\sysinfo.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 1124 "C:\Windows\SysWOW64\sysinfo.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 1132 "C:\Windows\SysWOW64\sysinfo.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 1116 "C:\Windows\SysWOW64\sysinfo.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 1140 "C:\Windows\SysWOW64\sysinfo.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 1136 "C:\Windows\SysWOW64\sysinfo.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 1144 "C:\Windows\SysWOW64\sysinfo.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 1160 "C:\Windows\SysWOW64\sysinfo.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\SysWOW64\sysinfo.exeC:\Windows\system32\sysinfo.exe 1148 "C:\Windows\SysWOW64\sysinfo.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1992
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
133KB
MD5f16800dea64522d686d88e67c7b02597
SHA169659552cc08c3be06edb77d32bed5828663af96
SHA256cf3582e4dfed8b6439c40755cd42149fe293d8d766a36b1a881ecbad7c62331f
SHA512a20e6ff79c5b687c72c9a0797bce065c3a42ed1df3b33b2bdbe0d50dbf6db624a8f4b0d3287891d92f45ab1ba2c521ffb209852cd5a1c1355bf3ce5446c6dbf5