Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe
-
Size
488KB
-
MD5
f3ac5a3e525f30d153392d0ef6e85673
-
SHA1
4c4a336c0428ee12b71b1d02b4c6ac69cba1b754
-
SHA256
6b50fdd2cc899f1cfe0b191c30ad8217514f52ca2fec5896ddbf5f9e1c6be43f
-
SHA512
2290edd41ec4c8faab7ab0ceb97a0a2d59a7f0fbd5003759c439ebdc1abdda7a5528356077c1951b5b7a01ef4f46ea0c58dcf1b7ba4b384c35b6e24864d029c3
-
SSDEEP
12288:7ReCXbFcHAc9r5pmcrIW+61dTdxGmnOY/6:48FSJDm7fMdTH75/6
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 5 IoCs
pid Process 2108 autoformat.exe 2904 autoformat.exe 2688 autoformat.exe 2136 autoformat.exe 2676 autoformat.exe -
Loads dropped DLL 11 IoCs
pid Process 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2108 autoformat.exe 2108 autoformat.exe 2904 autoformat.exe 2904 autoformat.exe 2688 autoformat.exe 2688 autoformat.exe 2136 autoformat.exe 2136 autoformat.exe 2676 autoformat.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\autoformat.exe f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\autoformat.exe f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe File created C:\Windows\SysWOW64\autoformat.exe autoformat.exe File created C:\Windows\SysWOW64\autoformat.exe autoformat.exe File created C:\Windows\SysWOW64\autoformat.exe autoformat.exe File created C:\Windows\SysWOW64\autoformat.exe autoformat.exe File created C:\Windows\SysWOW64\autoformat.exe autoformat.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autoformat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autoformat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autoformat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autoformat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autoformat.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2108 autoformat.exe 2108 autoformat.exe 2108 autoformat.exe 2108 autoformat.exe 2108 autoformat.exe 2108 autoformat.exe 2108 autoformat.exe 2108 autoformat.exe 2108 autoformat.exe 2108 autoformat.exe 2108 autoformat.exe 2108 autoformat.exe 2904 autoformat.exe 2904 autoformat.exe 2904 autoformat.exe 2904 autoformat.exe 2904 autoformat.exe 2904 autoformat.exe 2688 autoformat.exe 2688 autoformat.exe 2688 autoformat.exe 2688 autoformat.exe 2688 autoformat.exe 2688 autoformat.exe 2136 autoformat.exe 2136 autoformat.exe 2136 autoformat.exe 2136 autoformat.exe 2136 autoformat.exe 2136 autoformat.exe 2676 autoformat.exe 2676 autoformat.exe 2676 autoformat.exe 2676 autoformat.exe 2676 autoformat.exe 2676 autoformat.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2108 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2108 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2108 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2108 2100 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 31 PID 2108 wrote to memory of 2904 2108 autoformat.exe 32 PID 2108 wrote to memory of 2904 2108 autoformat.exe 32 PID 2108 wrote to memory of 2904 2108 autoformat.exe 32 PID 2108 wrote to memory of 2904 2108 autoformat.exe 32 PID 2904 wrote to memory of 2688 2904 autoformat.exe 33 PID 2904 wrote to memory of 2688 2904 autoformat.exe 33 PID 2904 wrote to memory of 2688 2904 autoformat.exe 33 PID 2904 wrote to memory of 2688 2904 autoformat.exe 33 PID 2688 wrote to memory of 2136 2688 autoformat.exe 35 PID 2688 wrote to memory of 2136 2688 autoformat.exe 35 PID 2688 wrote to memory of 2136 2688 autoformat.exe 35 PID 2688 wrote to memory of 2136 2688 autoformat.exe 35 PID 2136 wrote to memory of 2676 2136 autoformat.exe 36 PID 2136 wrote to memory of 2676 2136 autoformat.exe 36 PID 2136 wrote to memory of 2676 2136 autoformat.exe 36 PID 2136 wrote to memory of 2676 2136 autoformat.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\autoformat.exeC:\Windows\system32\autoformat.exe -bai C:\Users\Admin\AppData\Local\Temp\f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\autoformat.exeC:\Windows\system32\autoformat.exe -bai C:\Windows\SysWOW64\autoformat.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\autoformat.exeC:\Windows\system32\autoformat.exe -bai C:\Windows\SysWOW64\autoformat.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\autoformat.exeC:\Windows\system32\autoformat.exe -bai C:\Windows\SysWOW64\autoformat.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\autoformat.exeC:\Windows\system32\autoformat.exe -bai C:\Windows\SysWOW64\autoformat.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\autoformat.exeC:\Windows\system32\autoformat.exe -bai C:\Windows\SysWOW64\autoformat.exe7⤵PID:1928
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD5f3ac5a3e525f30d153392d0ef6e85673
SHA14c4a336c0428ee12b71b1d02b4c6ac69cba1b754
SHA2566b50fdd2cc899f1cfe0b191c30ad8217514f52ca2fec5896ddbf5f9e1c6be43f
SHA5122290edd41ec4c8faab7ab0ceb97a0a2d59a7f0fbd5003759c439ebdc1abdda7a5528356077c1951b5b7a01ef4f46ea0c58dcf1b7ba4b384c35b6e24864d029c3
-
Filesize
384KB
MD573d53bc5f2dc440980330ddb9784ac8e
SHA1313145f1df193a2e886cd7cab8f6ed2f97659515
SHA2567865cca438da438b9ba31dd40809ac5fd888c32ec532aea7fad97f9ff3d72f45
SHA512a79ad9ff0b1058ee9a58614807cb673c9881ea27a47353fd012f927ef2638d355888b0cad44ec2895ea20e9befccb41cf0b886455d751bad9178d807cd803135