Analysis
-
max time kernel
150s -
max time network
58s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 12:46
Static task
static1
Behavioral task
behavioral1
Sample
f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe
-
Size
488KB
-
MD5
f3ac5a3e525f30d153392d0ef6e85673
-
SHA1
4c4a336c0428ee12b71b1d02b4c6ac69cba1b754
-
SHA256
6b50fdd2cc899f1cfe0b191c30ad8217514f52ca2fec5896ddbf5f9e1c6be43f
-
SHA512
2290edd41ec4c8faab7ab0ceb97a0a2d59a7f0fbd5003759c439ebdc1abdda7a5528356077c1951b5b7a01ef4f46ea0c58dcf1b7ba4b384c35b6e24864d029c3
-
SSDEEP
12288:7ReCXbFcHAc9r5pmcrIW+61dTdxGmnOY/6:48FSJDm7fMdTH75/6
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 6 IoCs
pid Process 392 autoformat.exe 3936 autoformat.exe 2164 autoformat.exe 3816 autoformat.exe 4044 autoformat.exe 540 autoformat.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\autoformat.exe f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\autoformat.exe f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe File created C:\Windows\SysWOW64\autoformat.exe autoformat.exe File created C:\Windows\SysWOW64\autoformat.exe autoformat.exe File created C:\Windows\SysWOW64\autoformat.exe autoformat.exe File created C:\Windows\SysWOW64\autoformat.exe autoformat.exe File created C:\Windows\SysWOW64\autoformat.exe autoformat.exe -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autoformat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autoformat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autoformat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autoformat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language autoformat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 392 autoformat.exe 392 autoformat.exe 392 autoformat.exe 392 autoformat.exe 392 autoformat.exe 392 autoformat.exe 392 autoformat.exe 392 autoformat.exe 392 autoformat.exe 392 autoformat.exe 392 autoformat.exe 392 autoformat.exe 3936 autoformat.exe 3936 autoformat.exe 3936 autoformat.exe 3936 autoformat.exe 3936 autoformat.exe 3936 autoformat.exe 3936 autoformat.exe 3936 autoformat.exe 3936 autoformat.exe 3936 autoformat.exe 3936 autoformat.exe 3936 autoformat.exe 2164 autoformat.exe 2164 autoformat.exe 2164 autoformat.exe 2164 autoformat.exe 2164 autoformat.exe 2164 autoformat.exe 2164 autoformat.exe 2164 autoformat.exe 2164 autoformat.exe 2164 autoformat.exe 2164 autoformat.exe 2164 autoformat.exe 3816 autoformat.exe 3816 autoformat.exe 3816 autoformat.exe 3816 autoformat.exe 3816 autoformat.exe 3816 autoformat.exe 3816 autoformat.exe 3816 autoformat.exe 3816 autoformat.exe 3816 autoformat.exe 3816 autoformat.exe 3816 autoformat.exe 4044 autoformat.exe 4044 autoformat.exe 4044 autoformat.exe 4044 autoformat.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2484 wrote to memory of 392 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 82 PID 2484 wrote to memory of 392 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 82 PID 2484 wrote to memory of 392 2484 f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe 82 PID 392 wrote to memory of 3936 392 autoformat.exe 85 PID 392 wrote to memory of 3936 392 autoformat.exe 85 PID 392 wrote to memory of 3936 392 autoformat.exe 85 PID 3936 wrote to memory of 2164 3936 autoformat.exe 91 PID 3936 wrote to memory of 2164 3936 autoformat.exe 91 PID 3936 wrote to memory of 2164 3936 autoformat.exe 91 PID 2164 wrote to memory of 3816 2164 autoformat.exe 92 PID 2164 wrote to memory of 3816 2164 autoformat.exe 92 PID 2164 wrote to memory of 3816 2164 autoformat.exe 92 PID 3816 wrote to memory of 4044 3816 autoformat.exe 93 PID 3816 wrote to memory of 4044 3816 autoformat.exe 93 PID 3816 wrote to memory of 4044 3816 autoformat.exe 93 PID 4044 wrote to memory of 540 4044 autoformat.exe 94 PID 4044 wrote to memory of 540 4044 autoformat.exe 94 PID 4044 wrote to memory of 540 4044 autoformat.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\autoformat.exeC:\Windows\system32\autoformat.exe -bai C:\Users\Admin\AppData\Local\Temp\f3ac5a3e525f30d153392d0ef6e85673_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\autoformat.exeC:\Windows\system32\autoformat.exe -bai C:\Windows\SysWOW64\autoformat.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\autoformat.exeC:\Windows\system32\autoformat.exe -bai C:\Windows\SysWOW64\autoformat.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\autoformat.exeC:\Windows\system32\autoformat.exe -bai C:\Windows\SysWOW64\autoformat.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\SysWOW64\autoformat.exeC:\Windows\system32\autoformat.exe -bai C:\Windows\SysWOW64\autoformat.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\autoformat.exeC:\Windows\system32\autoformat.exe -bai C:\Windows\SysWOW64\autoformat.exe7⤵
- Executes dropped EXE
PID:540
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
488KB
MD5f3ac5a3e525f30d153392d0ef6e85673
SHA14c4a336c0428ee12b71b1d02b4c6ac69cba1b754
SHA2566b50fdd2cc899f1cfe0b191c30ad8217514f52ca2fec5896ddbf5f9e1c6be43f
SHA5122290edd41ec4c8faab7ab0ceb97a0a2d59a7f0fbd5003759c439ebdc1abdda7a5528356077c1951b5b7a01ef4f46ea0c58dcf1b7ba4b384c35b6e24864d029c3