Analysis
-
max time kernel
138s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 12:18
Static task
static1
Behavioral task
behavioral1
Sample
f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe
-
Size
151KB
-
MD5
f201a2c044026e948f92ff625bc83e1f
-
SHA1
cf4923de7a15f1d91090e2049d0caa343b8b7b63
-
SHA256
1e72ee5c21a74034982a7786815d8219738eb41a2f6d2fb662992aea0e1931e0
-
SHA512
1802865f2811a728b1db08c3dec7281a36e824062d6f03a1d9465abe4959d5534b628118e7e9087d0793a293295962825904ce987b112bdd488869a483613694
-
SSDEEP
3072:HhLKpkFJqH8LCSCuXr+jvxEFvon+k10vpKOvxGhkEi5cxKh3tJtKNG5l4Ff5YA:HhLocWSCuXr+jGF4BhkEOt2NvdiA
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 20 IoCs
pid Process 2084 msq23.exe 1948 msq23.exe 2700 msq23.exe 2740 msq23.exe 2540 msq23.exe 2596 msq23.exe 1568 msq23.exe 264 msq23.exe 568 msq23.exe 1488 msq23.exe 2996 msq23.exe 2136 msq23.exe 2156 msq23.exe 1924 msq23.exe 896 msq23.exe 2348 msq23.exe 1016 msq23.exe 2256 msq23.exe 2212 msq23.exe 1324 msq23.exe -
Loads dropped DLL 21 IoCs
pid Process 2168 f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe 2168 f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe 2084 msq23.exe 1948 msq23.exe 1948 msq23.exe 2740 msq23.exe 2740 msq23.exe 2596 msq23.exe 2596 msq23.exe 264 msq23.exe 264 msq23.exe 1488 msq23.exe 1488 msq23.exe 2136 msq23.exe 2136 msq23.exe 1924 msq23.exe 1924 msq23.exe 2348 msq23.exe 2348 msq23.exe 2256 msq23.exe 2256 msq23.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msq23.exe f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File opened for modification C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe File created C:\Windows\SysWOW64\msq23.exe msq23.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2832 set thread context of 2168 2832 f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe 31 PID 2084 set thread context of 1948 2084 msq23.exe 33 PID 2700 set thread context of 2740 2700 msq23.exe 35 PID 2540 set thread context of 2596 2540 msq23.exe 37 PID 1568 set thread context of 264 1568 msq23.exe 39 PID 568 set thread context of 1488 568 msq23.exe 41 PID 2996 set thread context of 2136 2996 msq23.exe 44 PID 2156 set thread context of 1924 2156 msq23.exe 46 PID 896 set thread context of 2348 896 msq23.exe 48 PID 1016 set thread context of 2256 1016 msq23.exe 50 PID 2212 set thread context of 1324 2212 msq23.exe 52 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq23.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2168 2832 f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe 31 PID 2832 wrote to memory of 2168 2832 f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe 31 PID 2832 wrote to memory of 2168 2832 f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe 31 PID 2832 wrote to memory of 2168 2832 f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe 31 PID 2832 wrote to memory of 2168 2832 f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe 31 PID 2832 wrote to memory of 2168 2832 f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe 31 PID 2168 wrote to memory of 2084 2168 f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe 32 PID 2168 wrote to memory of 2084 2168 f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe 32 PID 2168 wrote to memory of 2084 2168 f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe 32 PID 2168 wrote to memory of 2084 2168 f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe 32 PID 2084 wrote to memory of 1948 2084 msq23.exe 33 PID 2084 wrote to memory of 1948 2084 msq23.exe 33 PID 2084 wrote to memory of 1948 2084 msq23.exe 33 PID 2084 wrote to memory of 1948 2084 msq23.exe 33 PID 2084 wrote to memory of 1948 2084 msq23.exe 33 PID 2084 wrote to memory of 1948 2084 msq23.exe 33 PID 1948 wrote to memory of 2700 1948 msq23.exe 34 PID 1948 wrote to memory of 2700 1948 msq23.exe 34 PID 1948 wrote to memory of 2700 1948 msq23.exe 34 PID 1948 wrote to memory of 2700 1948 msq23.exe 34 PID 2700 wrote to memory of 2740 2700 msq23.exe 35 PID 2700 wrote to memory of 2740 2700 msq23.exe 35 PID 2700 wrote to memory of 2740 2700 msq23.exe 35 PID 2700 wrote to memory of 2740 2700 msq23.exe 35 PID 2700 wrote to memory of 2740 2700 msq23.exe 35 PID 2700 wrote to memory of 2740 2700 msq23.exe 35 PID 2740 wrote to memory of 2540 2740 msq23.exe 36 PID 2740 wrote to memory of 2540 2740 msq23.exe 36 PID 2740 wrote to memory of 2540 2740 msq23.exe 36 PID 2740 wrote to memory of 2540 2740 msq23.exe 36 PID 2540 wrote to memory of 2596 2540 msq23.exe 37 PID 2540 wrote to memory of 2596 2540 msq23.exe 37 PID 2540 wrote to memory of 2596 2540 msq23.exe 37 PID 2540 wrote to memory of 2596 2540 msq23.exe 37 PID 2540 wrote to memory of 2596 2540 msq23.exe 37 PID 2540 wrote to memory of 2596 2540 msq23.exe 37 PID 2596 wrote to memory of 1568 2596 msq23.exe 38 PID 2596 wrote to memory of 1568 2596 msq23.exe 38 PID 2596 wrote to memory of 1568 2596 msq23.exe 38 PID 2596 wrote to memory of 1568 2596 msq23.exe 38 PID 1568 wrote to memory of 264 1568 msq23.exe 39 PID 1568 wrote to memory of 264 1568 msq23.exe 39 PID 1568 wrote to memory of 264 1568 msq23.exe 39 PID 1568 wrote to memory of 264 1568 msq23.exe 39 PID 1568 wrote to memory of 264 1568 msq23.exe 39 PID 1568 wrote to memory of 264 1568 msq23.exe 39 PID 264 wrote to memory of 568 264 msq23.exe 40 PID 264 wrote to memory of 568 264 msq23.exe 40 PID 264 wrote to memory of 568 264 msq23.exe 40 PID 264 wrote to memory of 568 264 msq23.exe 40 PID 568 wrote to memory of 1488 568 msq23.exe 41 PID 568 wrote to memory of 1488 568 msq23.exe 41 PID 568 wrote to memory of 1488 568 msq23.exe 41 PID 568 wrote to memory of 1488 568 msq23.exe 41 PID 568 wrote to memory of 1488 568 msq23.exe 41 PID 568 wrote to memory of 1488 568 msq23.exe 41 PID 1488 wrote to memory of 2996 1488 msq23.exe 43 PID 1488 wrote to memory of 2996 1488 msq23.exe 43 PID 1488 wrote to memory of 2996 1488 msq23.exe 43 PID 1488 wrote to memory of 2996 1488 msq23.exe 43 PID 2996 wrote to memory of 2136 2996 msq23.exe 44 PID 2996 wrote to memory of 2136 2996 msq23.exe 44 PID 2996 wrote to memory of 2136 2996 msq23.exe 44 PID 2996 wrote to memory of 2136 2996 msq23.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 464 "C:\Users\Admin\AppData\Local\Temp\f201a2c044026e948f92ff625bc83e1f_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 524 "C:\Windows\SysWOW64\msq23.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 524 "C:\Windows\SysWOW64\msq23.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 524 "C:\Windows\SysWOW64\msq23.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 524 "C:\Windows\SysWOW64\msq23.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 528 "C:\Windows\SysWOW64\msq23.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 528 "C:\Windows\SysWOW64\msq23.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1924 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 524 "C:\Windows\SysWOW64\msq23.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:896 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 528 "C:\Windows\SysWOW64\msq23.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\system32\msq23.exe 524 "C:\Windows\SysWOW64\msq23.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2212 -
C:\Windows\SysWOW64\msq23.exeC:\Windows\SysWOW64\msq23.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1324
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD5f201a2c044026e948f92ff625bc83e1f
SHA1cf4923de7a15f1d91090e2049d0caa343b8b7b63
SHA2561e72ee5c21a74034982a7786815d8219738eb41a2f6d2fb662992aea0e1931e0
SHA5121802865f2811a728b1db08c3dec7281a36e824062d6f03a1d9465abe4959d5534b628118e7e9087d0793a293295962825904ce987b112bdd488869a483613694