Analysis
-
max time kernel
144s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
24-09-2024 17:12
Static task
static1
Behavioral task
behavioral1
Sample
f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe
-
Size
477KB
-
MD5
f420bad96029b024d42e23c5b9300e44
-
SHA1
79ef3ab63be198ed25851febee5c3bc603dc1d7a
-
SHA256
17b0f65a3acf878d72123a1648ce0490307ff176abf2117cb23b9ca30417a02e
-
SHA512
f962d6aeb2bb8e0a1a00a86dd709152542c9dd95750b062da6a86eec7b743e7e8610714663753530497219b21e0f37b8a4a1de204a638a0778cbd1d1e244d370
-
SSDEEP
12288:HIlKyhSac+JN0So1IImovQdkd2ABbl1HhjGR:olFhSnvSko47HJ6
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 23 IoCs
pid Process 2596 utgm.exe 2600 nlqx.exe 584 ydib.exe 2208 susn.exe 2792 dmcz.exe 1288 ommc.exe 2996 hewo.exe 2420 swga.exe 1672 eoqd.exe 1540 xgap.exe 1756 ifsb.exe 768 bxbf.exe 2396 nplq.exe 1508 yhvu.exe 2848 ujhl.exe 2640 fbrx.exe 1608 ztbi.exe 2360 kllm.exe 264 vlvy.exe 2780 odfc.exe 2424 aupn.exe 304 lmhz.exe 1592 eerd.exe -
Loads dropped DLL 46 IoCs
pid Process 2696 f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe 2696 f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe 2596 utgm.exe 2596 utgm.exe 2600 nlqx.exe 2600 nlqx.exe 584 ydib.exe 584 ydib.exe 2208 susn.exe 2208 susn.exe 2792 dmcz.exe 2792 dmcz.exe 1288 ommc.exe 1288 ommc.exe 2996 hewo.exe 2996 hewo.exe 2420 swga.exe 2420 swga.exe 1672 eoqd.exe 1672 eoqd.exe 1540 xgap.exe 1540 xgap.exe 1756 ifsb.exe 1756 ifsb.exe 768 bxbf.exe 768 bxbf.exe 2396 nplq.exe 2396 nplq.exe 1508 yhvu.exe 1508 yhvu.exe 2848 ujhl.exe 2848 ujhl.exe 2640 fbrx.exe 2640 fbrx.exe 1608 ztbi.exe 1608 ztbi.exe 2360 kllm.exe 2360 kllm.exe 264 vlvy.exe 264 vlvy.exe 2780 odfc.exe 2780 odfc.exe 2424 aupn.exe 2424 aupn.exe 304 lmhz.exe 304 lmhz.exe -
Drops file in System32 directory 46 IoCs
description ioc Process File created C:\Windows\SysWOW64\bxbf.exe ifsb.exe File opened for modification C:\Windows\SysWOW64\bxbf.exe ifsb.exe File opened for modification C:\Windows\SysWOW64\odfc.exe vlvy.exe File created C:\Windows\SysWOW64\dmcz.exe susn.exe File created C:\Windows\SysWOW64\xgap.exe eoqd.exe File opened for modification C:\Windows\SysWOW64\ifsb.exe xgap.exe File created C:\Windows\SysWOW64\odfc.exe vlvy.exe File opened for modification C:\Windows\SysWOW64\dmcz.exe susn.exe File opened for modification C:\Windows\SysWOW64\eoqd.exe swga.exe File opened for modification C:\Windows\SysWOW64\xgap.exe eoqd.exe File opened for modification C:\Windows\SysWOW64\yhvu.exe nplq.exe File created C:\Windows\SysWOW64\ujhl.exe yhvu.exe File created C:\Windows\SysWOW64\aupn.exe odfc.exe File created C:\Windows\SysWOW64\lmhz.exe aupn.exe File opened for modification C:\Windows\SysWOW64\susn.exe ydib.exe File created C:\Windows\SysWOW64\swga.exe hewo.exe File created C:\Windows\SysWOW64\susn.exe ydib.exe File opened for modification C:\Windows\SysWOW64\hewo.exe ommc.exe File created C:\Windows\SysWOW64\yhvu.exe nplq.exe File opened for modification C:\Windows\SysWOW64\ujhl.exe yhvu.exe File opened for modification C:\Windows\SysWOW64\fbrx.exe ujhl.exe File created C:\Windows\SysWOW64\kllm.exe ztbi.exe File created C:\Windows\SysWOW64\utgm.exe f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ydib.exe nlqx.exe File created C:\Windows\SysWOW64\ifsb.exe xgap.exe File created C:\Windows\SysWOW64\fbrx.exe ujhl.exe File opened for modification C:\Windows\SysWOW64\ommc.exe dmcz.exe File created C:\Windows\SysWOW64\nplq.exe bxbf.exe File opened for modification C:\Windows\SysWOW64\nplq.exe bxbf.exe File opened for modification C:\Windows\SysWOW64\ztbi.exe fbrx.exe File opened for modification C:\Windows\SysWOW64\kllm.exe ztbi.exe File opened for modification C:\Windows\SysWOW64\lmhz.exe aupn.exe File opened for modification C:\Windows\SysWOW64\utgm.exe f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\nlqx.exe utgm.exe File created C:\Windows\SysWOW64\eoqd.exe swga.exe File opened for modification C:\Windows\SysWOW64\vlvy.exe kllm.exe File created C:\Windows\SysWOW64\eerd.exe lmhz.exe File created C:\Windows\SysWOW64\ommc.exe dmcz.exe File created C:\Windows\SysWOW64\hewo.exe ommc.exe File opened for modification C:\Windows\SysWOW64\swga.exe hewo.exe File created C:\Windows\SysWOW64\ztbi.exe fbrx.exe File created C:\Windows\SysWOW64\vlvy.exe kllm.exe File opened for modification C:\Windows\SysWOW64\aupn.exe odfc.exe File opened for modification C:\Windows\SysWOW64\eerd.exe lmhz.exe File created C:\Windows\SysWOW64\nlqx.exe utgm.exe File created C:\Windows\SysWOW64\ydib.exe nlqx.exe -
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language susn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ommc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ifsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bxbf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nplq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eerd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utgm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nlqx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dmcz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eoqd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yhvu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vlvy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xgap.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ujhl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kllm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lmhz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ydib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hewo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language swga.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbrx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ztbi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language odfc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aupn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2696 wrote to memory of 2596 2696 f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe 30 PID 2696 wrote to memory of 2596 2696 f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe 30 PID 2696 wrote to memory of 2596 2696 f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe 30 PID 2696 wrote to memory of 2596 2696 f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe 30 PID 2596 wrote to memory of 2600 2596 utgm.exe 31 PID 2596 wrote to memory of 2600 2596 utgm.exe 31 PID 2596 wrote to memory of 2600 2596 utgm.exe 31 PID 2596 wrote to memory of 2600 2596 utgm.exe 31 PID 2600 wrote to memory of 584 2600 nlqx.exe 32 PID 2600 wrote to memory of 584 2600 nlqx.exe 32 PID 2600 wrote to memory of 584 2600 nlqx.exe 32 PID 2600 wrote to memory of 584 2600 nlqx.exe 32 PID 584 wrote to memory of 2208 584 ydib.exe 34 PID 584 wrote to memory of 2208 584 ydib.exe 34 PID 584 wrote to memory of 2208 584 ydib.exe 34 PID 584 wrote to memory of 2208 584 ydib.exe 34 PID 2208 wrote to memory of 2792 2208 susn.exe 35 PID 2208 wrote to memory of 2792 2208 susn.exe 35 PID 2208 wrote to memory of 2792 2208 susn.exe 35 PID 2208 wrote to memory of 2792 2208 susn.exe 35 PID 2792 wrote to memory of 1288 2792 dmcz.exe 36 PID 2792 wrote to memory of 1288 2792 dmcz.exe 36 PID 2792 wrote to memory of 1288 2792 dmcz.exe 36 PID 2792 wrote to memory of 1288 2792 dmcz.exe 36 PID 1288 wrote to memory of 2996 1288 ommc.exe 37 PID 1288 wrote to memory of 2996 1288 ommc.exe 37 PID 1288 wrote to memory of 2996 1288 ommc.exe 37 PID 1288 wrote to memory of 2996 1288 ommc.exe 37 PID 2996 wrote to memory of 2420 2996 hewo.exe 38 PID 2996 wrote to memory of 2420 2996 hewo.exe 38 PID 2996 wrote to memory of 2420 2996 hewo.exe 38 PID 2996 wrote to memory of 2420 2996 hewo.exe 38 PID 2420 wrote to memory of 1672 2420 swga.exe 39 PID 2420 wrote to memory of 1672 2420 swga.exe 39 PID 2420 wrote to memory of 1672 2420 swga.exe 39 PID 2420 wrote to memory of 1672 2420 swga.exe 39 PID 1672 wrote to memory of 1540 1672 eoqd.exe 40 PID 1672 wrote to memory of 1540 1672 eoqd.exe 40 PID 1672 wrote to memory of 1540 1672 eoqd.exe 40 PID 1672 wrote to memory of 1540 1672 eoqd.exe 40 PID 1540 wrote to memory of 1756 1540 xgap.exe 41 PID 1540 wrote to memory of 1756 1540 xgap.exe 41 PID 1540 wrote to memory of 1756 1540 xgap.exe 41 PID 1540 wrote to memory of 1756 1540 xgap.exe 41 PID 1756 wrote to memory of 768 1756 ifsb.exe 42 PID 1756 wrote to memory of 768 1756 ifsb.exe 42 PID 1756 wrote to memory of 768 1756 ifsb.exe 42 PID 1756 wrote to memory of 768 1756 ifsb.exe 42 PID 768 wrote to memory of 2396 768 bxbf.exe 43 PID 768 wrote to memory of 2396 768 bxbf.exe 43 PID 768 wrote to memory of 2396 768 bxbf.exe 43 PID 768 wrote to memory of 2396 768 bxbf.exe 43 PID 2396 wrote to memory of 1508 2396 nplq.exe 44 PID 2396 wrote to memory of 1508 2396 nplq.exe 44 PID 2396 wrote to memory of 1508 2396 nplq.exe 44 PID 2396 wrote to memory of 1508 2396 nplq.exe 44 PID 1508 wrote to memory of 2848 1508 yhvu.exe 45 PID 1508 wrote to memory of 2848 1508 yhvu.exe 45 PID 1508 wrote to memory of 2848 1508 yhvu.exe 45 PID 1508 wrote to memory of 2848 1508 yhvu.exe 45 PID 2848 wrote to memory of 2640 2848 ujhl.exe 46 PID 2848 wrote to memory of 2640 2848 ujhl.exe 46 PID 2848 wrote to memory of 2640 2848 ujhl.exe 46 PID 2848 wrote to memory of 2640 2848 ujhl.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\utgm.exeC:\Windows\system32\utgm.exe 584 "C:\Users\Admin\AppData\Local\Temp\f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\nlqx.exeC:\Windows\system32\nlqx.exe 540 "C:\Windows\SysWOW64\utgm.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Windows\SysWOW64\ydib.exeC:\Windows\system32\ydib.exe 548 "C:\Windows\SysWOW64\nlqx.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\susn.exeC:\Windows\system32\susn.exe 544 "C:\Windows\SysWOW64\ydib.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\dmcz.exeC:\Windows\system32\dmcz.exe 572 "C:\Windows\SysWOW64\susn.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\ommc.exeC:\Windows\system32\ommc.exe 552 "C:\Windows\SysWOW64\dmcz.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\hewo.exeC:\Windows\system32\hewo.exe 556 "C:\Windows\SysWOW64\ommc.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\swga.exeC:\Windows\system32\swga.exe 560 "C:\Windows\SysWOW64\hewo.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\eoqd.exeC:\Windows\system32\eoqd.exe 564 "C:\Windows\SysWOW64\swga.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Windows\SysWOW64\xgap.exeC:\Windows\system32\xgap.exe 596 "C:\Windows\SysWOW64\eoqd.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\ifsb.exeC:\Windows\system32\ifsb.exe 580 "C:\Windows\SysWOW64\xgap.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\bxbf.exeC:\Windows\system32\bxbf.exe 592 "C:\Windows\SysWOW64\ifsb.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\nplq.exeC:\Windows\system32\nplq.exe 604 "C:\Windows\SysWOW64\bxbf.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\yhvu.exeC:\Windows\system32\yhvu.exe 576 "C:\Windows\SysWOW64\nplq.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\ujhl.exeC:\Windows\system32\ujhl.exe 616 "C:\Windows\SysWOW64\yhvu.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\fbrx.exeC:\Windows\system32\fbrx.exe 624 "C:\Windows\SysWOW64\ujhl.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2640 -
C:\Windows\SysWOW64\ztbi.exeC:\Windows\system32\ztbi.exe 588 "C:\Windows\SysWOW64\fbrx.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1608 -
C:\Windows\SysWOW64\kllm.exeC:\Windows\system32\kllm.exe 612 "C:\Windows\SysWOW64\ztbi.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\vlvy.exeC:\Windows\system32\vlvy.exe 620 "C:\Windows\SysWOW64\kllm.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:264 -
C:\Windows\SysWOW64\odfc.exeC:\Windows\system32\odfc.exe 628 "C:\Windows\SysWOW64\vlvy.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\aupn.exeC:\Windows\system32\aupn.exe 632 "C:\Windows\SysWOW64\odfc.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\lmhz.exeC:\Windows\system32\lmhz.exe 644 "C:\Windows\SysWOW64\aupn.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:304 -
C:\Windows\SysWOW64\eerd.exeC:\Windows\system32\eerd.exe 636 "C:\Windows\SysWOW64\lmhz.exe"24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1592
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
477KB
MD5f420bad96029b024d42e23c5b9300e44
SHA179ef3ab63be198ed25851febee5c3bc603dc1d7a
SHA25617b0f65a3acf878d72123a1648ce0490307ff176abf2117cb23b9ca30417a02e
SHA512f962d6aeb2bb8e0a1a00a86dd709152542c9dd95750b062da6a86eec7b743e7e8610714663753530497219b21e0f37b8a4a1de204a638a0778cbd1d1e244d370