Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-09-2024 16:57
Static task
static1
Behavioral task
behavioral1
Sample
f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe
-
Size
380KB
-
MD5
f2b7222978fa35c91ebf8bf2f6cc82ca
-
SHA1
b874df673b962b8be271fb4e99aee36e92aba1fa
-
SHA256
4346d4ffe30e8d047302a42211e45fd5bfd88621376a5f507f1266e0f7a2fd50
-
SHA512
488d4116f55bd3ba19cb258ec02252f631272ef81118958cf661cfa413c537174a7e9ed02c8d2321c1ba65d2c639aaab0fa9da4ceb5a020d6eadb1c449f4060c
-
SSDEEP
6144:WRjfpbvNzGn6+MT1k6CW3e0dZfFgCZTdsmnElX9mzHsmaEJFLaXupTR5QWfd:WRjfHza6+M5ko1dTdxGmnOX9uhL+KT42
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 10 IoCs
pid Process 2724 wuauclt13.exe 2908 wuauclt13.exe 2768 wuauclt13.exe 2844 wuauclt13.exe 2832 wuauclt13.exe 1836 wuauclt13.exe 1112 wuauclt13.exe 888 wuauclt13.exe 1380 wuauclt13.exe 2260 wuauclt13.exe -
Loads dropped DLL 20 IoCs
pid Process 1304 f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe 1304 f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe 2724 wuauclt13.exe 2724 wuauclt13.exe 2908 wuauclt13.exe 2908 wuauclt13.exe 2768 wuauclt13.exe 2768 wuauclt13.exe 2844 wuauclt13.exe 2844 wuauclt13.exe 2832 wuauclt13.exe 2832 wuauclt13.exe 1836 wuauclt13.exe 1836 wuauclt13.exe 1112 wuauclt13.exe 1112 wuauclt13.exe 888 wuauclt13.exe 888 wuauclt13.exe 1380 wuauclt13.exe 1380 wuauclt13.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File opened for modification C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe File created C:\Windows\SysWOW64\wuauclt13.exe wuauclt13.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuauclt13.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1304 wrote to memory of 2724 1304 f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe 30 PID 1304 wrote to memory of 2724 1304 f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe 30 PID 1304 wrote to memory of 2724 1304 f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe 30 PID 1304 wrote to memory of 2724 1304 f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe 30 PID 2724 wrote to memory of 2908 2724 wuauclt13.exe 31 PID 2724 wrote to memory of 2908 2724 wuauclt13.exe 31 PID 2724 wrote to memory of 2908 2724 wuauclt13.exe 31 PID 2724 wrote to memory of 2908 2724 wuauclt13.exe 31 PID 2908 wrote to memory of 2768 2908 wuauclt13.exe 33 PID 2908 wrote to memory of 2768 2908 wuauclt13.exe 33 PID 2908 wrote to memory of 2768 2908 wuauclt13.exe 33 PID 2908 wrote to memory of 2768 2908 wuauclt13.exe 33 PID 2768 wrote to memory of 2844 2768 wuauclt13.exe 34 PID 2768 wrote to memory of 2844 2768 wuauclt13.exe 34 PID 2768 wrote to memory of 2844 2768 wuauclt13.exe 34 PID 2768 wrote to memory of 2844 2768 wuauclt13.exe 34 PID 2844 wrote to memory of 2832 2844 wuauclt13.exe 35 PID 2844 wrote to memory of 2832 2844 wuauclt13.exe 35 PID 2844 wrote to memory of 2832 2844 wuauclt13.exe 35 PID 2844 wrote to memory of 2832 2844 wuauclt13.exe 35 PID 2832 wrote to memory of 1836 2832 wuauclt13.exe 36 PID 2832 wrote to memory of 1836 2832 wuauclt13.exe 36 PID 2832 wrote to memory of 1836 2832 wuauclt13.exe 36 PID 2832 wrote to memory of 1836 2832 wuauclt13.exe 36 PID 1836 wrote to memory of 1112 1836 wuauclt13.exe 37 PID 1836 wrote to memory of 1112 1836 wuauclt13.exe 37 PID 1836 wrote to memory of 1112 1836 wuauclt13.exe 37 PID 1836 wrote to memory of 1112 1836 wuauclt13.exe 37 PID 1112 wrote to memory of 888 1112 wuauclt13.exe 38 PID 1112 wrote to memory of 888 1112 wuauclt13.exe 38 PID 1112 wrote to memory of 888 1112 wuauclt13.exe 38 PID 1112 wrote to memory of 888 1112 wuauclt13.exe 38 PID 888 wrote to memory of 1380 888 wuauclt13.exe 39 PID 888 wrote to memory of 1380 888 wuauclt13.exe 39 PID 888 wrote to memory of 1380 888 wuauclt13.exe 39 PID 888 wrote to memory of 1380 888 wuauclt13.exe 39 PID 1380 wrote to memory of 2260 1380 wuauclt13.exe 40 PID 1380 wrote to memory of 2260 1380 wuauclt13.exe 40 PID 1380 wrote to memory of 2260 1380 wuauclt13.exe 40 PID 1380 wrote to memory of 2260 1380 wuauclt13.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 528 "C:\Users\Admin\AppData\Local\Temp\f2b7222978fa35c91ebf8bf2f6cc82ca_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 520 "C:\Windows\SysWOW64\wuauclt13.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 532 "C:\Windows\SysWOW64\wuauclt13.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 536 "C:\Windows\SysWOW64\wuauclt13.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 540 "C:\Windows\SysWOW64\wuauclt13.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 524 "C:\Windows\SysWOW64\wuauclt13.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 544 "C:\Windows\SysWOW64\wuauclt13.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 556 "C:\Windows\SysWOW64\wuauclt13.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:888 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 548 "C:\Windows\SysWOW64\wuauclt13.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\SysWOW64\wuauclt13.exeC:\Windows\system32\wuauclt13.exe 572 "C:\Windows\SysWOW64\wuauclt13.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2260
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
380KB
MD5f2b7222978fa35c91ebf8bf2f6cc82ca
SHA1b874df673b962b8be271fb4e99aee36e92aba1fa
SHA2564346d4ffe30e8d047302a42211e45fd5bfd88621376a5f507f1266e0f7a2fd50
SHA512488d4116f55bd3ba19cb258ec02252f631272ef81118958cf661cfa413c537174a7e9ed02c8d2321c1ba65d2c639aaab0fa9da4ceb5a020d6eadb1c449f4060c