Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 13:35
Static task
static1
Behavioral task
behavioral1
Sample
f2201039a561e5769e358067eb515967_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f2201039a561e5769e358067eb515967_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f2201039a561e5769e358067eb515967_JaffaCakes118.exe
-
Size
202KB
-
MD5
f2201039a561e5769e358067eb515967
-
SHA1
e09f64763149330dc566857a22b6b9d5bfb983ae
-
SHA256
98f045d8f7daec9e2c0c899ab4780601c9968c8daab11db22bc7f0c7ea9672aa
-
SHA512
884fdb9943af21f35251953b1a04cb56014b9fde5cc2be5cce3a14bbfa1aad6962b2bebd334c053eebf4670a2f51180701fe8e25bf4bc227d08af5d8eae4c188
-
SSDEEP
3072:AJPbQZZ5tMT21JOGB2gTFfPIVzyU2MsZEDYRktsqRkRxjZ9xV3n0HB0MFdtKE:qPbYZoCfOlgJhUKZssqmRxC0MtKE
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 780 wnpfsx.exe -
Executes dropped EXE 31 IoCs
pid Process 2776 wnpfsx.exe 780 wnpfsx.exe 2140 wnpfsx.exe 2088 wnpfsx.exe 2784 wnpfsx.exe 2232 wnpfsx.exe 1144 wnpfsx.exe 296 wnpfsx.exe 2276 wnpfsx.exe 1632 wnpfsx.exe 2196 wnpfsx.exe 1620 wnpfsx.exe 288 wnpfsx.exe 2128 wnpfsx.exe 2548 wnpfsx.exe 1644 wnpfsx.exe 1708 wnpfsx.exe 2900 wnpfsx.exe 2848 wnpfsx.exe 712 wnpfsx.exe 2252 wnpfsx.exe 1768 wnpfsx.exe 2692 wnpfsx.exe 2288 wnpfsx.exe 112 wnpfsx.exe 2664 wnpfsx.exe 2176 wnpfsx.exe 752 wnpfsx.exe 2356 wnpfsx.exe 1980 wnpfsx.exe 1548 wnpfsx.exe -
Loads dropped DLL 32 IoCs
pid Process 3020 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 3020 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 780 wnpfsx.exe 780 wnpfsx.exe 2088 wnpfsx.exe 2088 wnpfsx.exe 2232 wnpfsx.exe 2232 wnpfsx.exe 296 wnpfsx.exe 296 wnpfsx.exe 1632 wnpfsx.exe 1632 wnpfsx.exe 1620 wnpfsx.exe 1620 wnpfsx.exe 2128 wnpfsx.exe 2128 wnpfsx.exe 1644 wnpfsx.exe 1644 wnpfsx.exe 2900 wnpfsx.exe 2900 wnpfsx.exe 712 wnpfsx.exe 712 wnpfsx.exe 1768 wnpfsx.exe 1768 wnpfsx.exe 2288 wnpfsx.exe 2288 wnpfsx.exe 2664 wnpfsx.exe 2664 wnpfsx.exe 752 wnpfsx.exe 752 wnpfsx.exe 1980 wnpfsx.exe 1980 wnpfsx.exe -
resource yara_rule behavioral1/memory/3020-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/3020-14-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/3020-12-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/3020-11-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/3020-6-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/3020-4-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/3020-13-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/3020-27-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/780-39-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/780-38-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/780-40-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/780-41-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/780-48-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2088-59-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2088-61-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2088-58-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2088-60-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2088-66-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2232-77-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2232-78-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2232-79-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2232-84-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/296-95-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/296-103-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1632-121-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1620-140-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2128-158-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1644-177-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2900-194-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/712-212-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1768-231-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2288-249-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2664-265-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/752-279-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1980-293-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Drops file in System32 directory 32 IoCs
description ioc Process File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File created C:\Windows\SysWOW64\wnpfsx.exe f2201039a561e5769e358067eb515967_JaffaCakes118.exe File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe f2201039a561e5769e358067eb515967_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File opened for modification C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe File created C:\Windows\SysWOW64\wnpfsx.exe wnpfsx.exe -
Suspicious use of SetThreadContext 16 IoCs
description pid Process procid_target PID 2884 set thread context of 3020 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 30 PID 2776 set thread context of 780 2776 wnpfsx.exe 32 PID 2140 set thread context of 2088 2140 wnpfsx.exe 34 PID 2784 set thread context of 2232 2784 wnpfsx.exe 37 PID 1144 set thread context of 296 1144 wnpfsx.exe 39 PID 2276 set thread context of 1632 2276 wnpfsx.exe 41 PID 2196 set thread context of 1620 2196 wnpfsx.exe 43 PID 288 set thread context of 2128 288 wnpfsx.exe 45 PID 2548 set thread context of 1644 2548 wnpfsx.exe 47 PID 1708 set thread context of 2900 1708 wnpfsx.exe 49 PID 2848 set thread context of 712 2848 wnpfsx.exe 51 PID 2252 set thread context of 1768 2252 wnpfsx.exe 53 PID 2692 set thread context of 2288 2692 wnpfsx.exe 55 PID 112 set thread context of 2664 112 wnpfsx.exe 57 PID 2176 set thread context of 752 2176 wnpfsx.exe 59 PID 2356 set thread context of 1980 2356 wnpfsx.exe 61 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2201039a561e5769e358067eb515967_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2201039a561e5769e358067eb515967_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wnpfsx.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 3020 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 780 wnpfsx.exe 2088 wnpfsx.exe 2232 wnpfsx.exe 296 wnpfsx.exe 1632 wnpfsx.exe 1620 wnpfsx.exe 2128 wnpfsx.exe 1644 wnpfsx.exe 2900 wnpfsx.exe 712 wnpfsx.exe 1768 wnpfsx.exe 2288 wnpfsx.exe 2664 wnpfsx.exe 752 wnpfsx.exe 1980 wnpfsx.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe Token: SeSecurityPrivilege 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2884 wrote to memory of 3020 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 30 PID 2884 wrote to memory of 3020 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 30 PID 2884 wrote to memory of 3020 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 30 PID 2884 wrote to memory of 3020 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 30 PID 2884 wrote to memory of 3020 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 30 PID 2884 wrote to memory of 3020 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 30 PID 2884 wrote to memory of 3020 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 30 PID 2884 wrote to memory of 3020 2884 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 30 PID 3020 wrote to memory of 2776 3020 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2776 3020 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2776 3020 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 31 PID 3020 wrote to memory of 2776 3020 f2201039a561e5769e358067eb515967_JaffaCakes118.exe 31 PID 2776 wrote to memory of 780 2776 wnpfsx.exe 32 PID 2776 wrote to memory of 780 2776 wnpfsx.exe 32 PID 2776 wrote to memory of 780 2776 wnpfsx.exe 32 PID 2776 wrote to memory of 780 2776 wnpfsx.exe 32 PID 2776 wrote to memory of 780 2776 wnpfsx.exe 32 PID 2776 wrote to memory of 780 2776 wnpfsx.exe 32 PID 2776 wrote to memory of 780 2776 wnpfsx.exe 32 PID 2776 wrote to memory of 780 2776 wnpfsx.exe 32 PID 780 wrote to memory of 2140 780 wnpfsx.exe 33 PID 780 wrote to memory of 2140 780 wnpfsx.exe 33 PID 780 wrote to memory of 2140 780 wnpfsx.exe 33 PID 780 wrote to memory of 2140 780 wnpfsx.exe 33 PID 2140 wrote to memory of 2088 2140 wnpfsx.exe 34 PID 2140 wrote to memory of 2088 2140 wnpfsx.exe 34 PID 2140 wrote to memory of 2088 2140 wnpfsx.exe 34 PID 2140 wrote to memory of 2088 2140 wnpfsx.exe 34 PID 2140 wrote to memory of 2088 2140 wnpfsx.exe 34 PID 2140 wrote to memory of 2088 2140 wnpfsx.exe 34 PID 2140 wrote to memory of 2088 2140 wnpfsx.exe 34 PID 2140 wrote to memory of 2088 2140 wnpfsx.exe 34 PID 2088 wrote to memory of 2784 2088 wnpfsx.exe 35 PID 2088 wrote to memory of 2784 2088 wnpfsx.exe 35 PID 2088 wrote to memory of 2784 2088 wnpfsx.exe 35 PID 2088 wrote to memory of 2784 2088 wnpfsx.exe 35 PID 2784 wrote to memory of 2232 2784 wnpfsx.exe 37 PID 2784 wrote to memory of 2232 2784 wnpfsx.exe 37 PID 2784 wrote to memory of 2232 2784 wnpfsx.exe 37 PID 2784 wrote to memory of 2232 2784 wnpfsx.exe 37 PID 2784 wrote to memory of 2232 2784 wnpfsx.exe 37 PID 2784 wrote to memory of 2232 2784 wnpfsx.exe 37 PID 2784 wrote to memory of 2232 2784 wnpfsx.exe 37 PID 2784 wrote to memory of 2232 2784 wnpfsx.exe 37 PID 2232 wrote to memory of 1144 2232 wnpfsx.exe 38 PID 2232 wrote to memory of 1144 2232 wnpfsx.exe 38 PID 2232 wrote to memory of 1144 2232 wnpfsx.exe 38 PID 2232 wrote to memory of 1144 2232 wnpfsx.exe 38 PID 1144 wrote to memory of 296 1144 wnpfsx.exe 39 PID 1144 wrote to memory of 296 1144 wnpfsx.exe 39 PID 1144 wrote to memory of 296 1144 wnpfsx.exe 39 PID 1144 wrote to memory of 296 1144 wnpfsx.exe 39 PID 1144 wrote to memory of 296 1144 wnpfsx.exe 39 PID 1144 wrote to memory of 296 1144 wnpfsx.exe 39 PID 1144 wrote to memory of 296 1144 wnpfsx.exe 39 PID 1144 wrote to memory of 296 1144 wnpfsx.exe 39 PID 296 wrote to memory of 2276 296 wnpfsx.exe 40 PID 296 wrote to memory of 2276 296 wnpfsx.exe 40 PID 296 wrote to memory of 2276 296 wnpfsx.exe 40 PID 296 wrote to memory of 2276 296 wnpfsx.exe 40 PID 2276 wrote to memory of 1632 2276 wnpfsx.exe 41 PID 2276 wrote to memory of 1632 2276 wnpfsx.exe 41 PID 2276 wrote to memory of 1632 2276 wnpfsx.exe 41 PID 2276 wrote to memory of 1632 2276 wnpfsx.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2201039a561e5769e358067eb515967_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2201039a561e5769e358067eb515967_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\f2201039a561e5769e358067eb515967_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2201039a561e5769e358067eb515967_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Users\Admin\AppData\Local\Temp\F22010~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Users\Admin\AppData\Local\Temp\F22010~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1620 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:288 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1644 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2900 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:712 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1768 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2288 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:112 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:752 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Windows\SysWOW64\wnpfsx.exe"C:\Windows\system32\wnpfsx.exe" C:\Windows\SysWOW64\wnpfsx.exe33⤵
- Executes dropped EXE
PID:1548
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
202KB
MD5f2201039a561e5769e358067eb515967
SHA1e09f64763149330dc566857a22b6b9d5bfb983ae
SHA25698f045d8f7daec9e2c0c899ab4780601c9968c8daab11db22bc7f0c7ea9672aa
SHA512884fdb9943af21f35251953b1a04cb56014b9fde5cc2be5cce3a14bbfa1aad6962b2bebd334c053eebf4670a2f51180701fe8e25bf4bc227d08af5d8eae4c188