Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-09-2024 17:12
Static task
static1
Behavioral task
behavioral1
Sample
f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe
-
Size
477KB
-
MD5
f420bad96029b024d42e23c5b9300e44
-
SHA1
79ef3ab63be198ed25851febee5c3bc603dc1d7a
-
SHA256
17b0f65a3acf878d72123a1648ce0490307ff176abf2117cb23b9ca30417a02e
-
SHA512
f962d6aeb2bb8e0a1a00a86dd709152542c9dd95750b062da6a86eec7b743e7e8610714663753530497219b21e0f37b8a4a1de204a638a0778cbd1d1e244d370
-
SSDEEP
12288:HIlKyhSac+JN0So1IImovQdkd2ABbl1HhjGR:olFhSnvSko47HJ6
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 24 IoCs
pid Process 3368 pnmg.exe 2244 utoy.exe 4332 sefl.exe 3364 mxcu.exe 2464 rhbh.exe 1412 mayh.exe 1696 jcpu.exe 2008 ldmc.exe 1756 jfli.exe 4556 lghq.exe 1884 iiyd.exe 4592 cjvd.exe 3852 ilur.exe 1164 cerz.exe 4840 hoie.exe 3204 bhfm.exe 2204 zkea.exe 4472 bkba.exe 4540 ynsn.exe 1572 snpv.exe 3956 yqoj.exe 1656 sqlj.exe 4648 xtcw.exe 2692 rlyw.exe -
Drops file in System32 directory 48 IoCs
description ioc Process File created C:\Windows\SysWOW64\cjvd.exe iiyd.exe File opened for modification C:\Windows\SysWOW64\bkba.exe zkea.exe File created C:\Windows\SysWOW64\sefl.exe utoy.exe File opened for modification C:\Windows\SysWOW64\sefl.exe utoy.exe File opened for modification C:\Windows\SysWOW64\mxcu.exe sefl.exe File created C:\Windows\SysWOW64\jcpu.exe mayh.exe File opened for modification C:\Windows\SysWOW64\jfli.exe ldmc.exe File created C:\Windows\SysWOW64\iiyd.exe lghq.exe File opened for modification C:\Windows\SysWOW64\ynsn.exe bkba.exe File opened for modification C:\Windows\SysWOW64\pnmg.exe f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\cerz.exe ilur.exe File created C:\Windows\SysWOW64\hoie.exe cerz.exe File opened for modification C:\Windows\SysWOW64\bhfm.exe hoie.exe File created C:\Windows\SysWOW64\zkea.exe bhfm.exe File opened for modification C:\Windows\SysWOW64\xtcw.exe sqlj.exe File opened for modification C:\Windows\SysWOW64\rlyw.exe xtcw.exe File created C:\Windows\SysWOW64\mxcu.exe sefl.exe File opened for modification C:\Windows\SysWOW64\ldmc.exe jcpu.exe File opened for modification C:\Windows\SysWOW64\lghq.exe jfli.exe File opened for modification C:\Windows\SysWOW64\cjvd.exe iiyd.exe File created C:\Windows\SysWOW64\bkba.exe zkea.exe File created C:\Windows\SysWOW64\ynsn.exe bkba.exe File created C:\Windows\SysWOW64\bhfm.exe hoie.exe File opened for modification C:\Windows\SysWOW64\yqoj.exe snpv.exe File created C:\Windows\SysWOW64\pnmg.exe f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\rhbh.exe mxcu.exe File created C:\Windows\SysWOW64\lghq.exe jfli.exe File opened for modification C:\Windows\SysWOW64\iiyd.exe lghq.exe File created C:\Windows\SysWOW64\ilur.exe cjvd.exe File opened for modification C:\Windows\SysWOW64\ilur.exe cjvd.exe File created C:\Windows\SysWOW64\xtcw.exe sqlj.exe File opened for modification C:\Windows\SysWOW64\utoy.exe pnmg.exe File created C:\Windows\SysWOW64\rlyw.exe xtcw.exe File created C:\Windows\SysWOW64\rhbh.exe mxcu.exe File created C:\Windows\SysWOW64\jfli.exe ldmc.exe File opened for modification C:\Windows\SysWOW64\zkea.exe bhfm.exe File opened for modification C:\Windows\SysWOW64\snpv.exe ynsn.exe File created C:\Windows\SysWOW64\sqlj.exe yqoj.exe File created C:\Windows\SysWOW64\utoy.exe pnmg.exe File created C:\Windows\SysWOW64\mayh.exe rhbh.exe File created C:\Windows\SysWOW64\ldmc.exe jcpu.exe File opened for modification C:\Windows\SysWOW64\hoie.exe cerz.exe File created C:\Windows\SysWOW64\snpv.exe ynsn.exe File opened for modification C:\Windows\SysWOW64\mayh.exe rhbh.exe File opened for modification C:\Windows\SysWOW64\jcpu.exe mayh.exe File created C:\Windows\SysWOW64\cerz.exe ilur.exe File created C:\Windows\SysWOW64\yqoj.exe snpv.exe File opened for modification C:\Windows\SysWOW64\sqlj.exe yqoj.exe -
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jcpu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iiyd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ilur.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yqoj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sqlj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xtcw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rhbh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mayh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rlyw.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sefl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cjvd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cerz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hoie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ynsn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pnmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language snpv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bhfm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bkba.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ldmc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jfli.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lghq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zkea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language utoy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mxcu.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5080 wrote to memory of 3368 5080 f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe 82 PID 5080 wrote to memory of 3368 5080 f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe 82 PID 5080 wrote to memory of 3368 5080 f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe 82 PID 3368 wrote to memory of 2244 3368 pnmg.exe 83 PID 3368 wrote to memory of 2244 3368 pnmg.exe 83 PID 3368 wrote to memory of 2244 3368 pnmg.exe 83 PID 2244 wrote to memory of 4332 2244 utoy.exe 84 PID 2244 wrote to memory of 4332 2244 utoy.exe 84 PID 2244 wrote to memory of 4332 2244 utoy.exe 84 PID 4332 wrote to memory of 3364 4332 sefl.exe 85 PID 4332 wrote to memory of 3364 4332 sefl.exe 85 PID 4332 wrote to memory of 3364 4332 sefl.exe 85 PID 3364 wrote to memory of 2464 3364 mxcu.exe 93 PID 3364 wrote to memory of 2464 3364 mxcu.exe 93 PID 3364 wrote to memory of 2464 3364 mxcu.exe 93 PID 2464 wrote to memory of 1412 2464 rhbh.exe 96 PID 2464 wrote to memory of 1412 2464 rhbh.exe 96 PID 2464 wrote to memory of 1412 2464 rhbh.exe 96 PID 1412 wrote to memory of 1696 1412 mayh.exe 97 PID 1412 wrote to memory of 1696 1412 mayh.exe 97 PID 1412 wrote to memory of 1696 1412 mayh.exe 97 PID 1696 wrote to memory of 2008 1696 jcpu.exe 98 PID 1696 wrote to memory of 2008 1696 jcpu.exe 98 PID 1696 wrote to memory of 2008 1696 jcpu.exe 98 PID 2008 wrote to memory of 1756 2008 ldmc.exe 99 PID 2008 wrote to memory of 1756 2008 ldmc.exe 99 PID 2008 wrote to memory of 1756 2008 ldmc.exe 99 PID 1756 wrote to memory of 4556 1756 jfli.exe 100 PID 1756 wrote to memory of 4556 1756 jfli.exe 100 PID 1756 wrote to memory of 4556 1756 jfli.exe 100 PID 4556 wrote to memory of 1884 4556 lghq.exe 101 PID 4556 wrote to memory of 1884 4556 lghq.exe 101 PID 4556 wrote to memory of 1884 4556 lghq.exe 101 PID 1884 wrote to memory of 4592 1884 iiyd.exe 102 PID 1884 wrote to memory of 4592 1884 iiyd.exe 102 PID 1884 wrote to memory of 4592 1884 iiyd.exe 102 PID 4592 wrote to memory of 3852 4592 cjvd.exe 103 PID 4592 wrote to memory of 3852 4592 cjvd.exe 103 PID 4592 wrote to memory of 3852 4592 cjvd.exe 103 PID 3852 wrote to memory of 1164 3852 ilur.exe 104 PID 3852 wrote to memory of 1164 3852 ilur.exe 104 PID 3852 wrote to memory of 1164 3852 ilur.exe 104 PID 1164 wrote to memory of 4840 1164 cerz.exe 105 PID 1164 wrote to memory of 4840 1164 cerz.exe 105 PID 1164 wrote to memory of 4840 1164 cerz.exe 105 PID 4840 wrote to memory of 3204 4840 hoie.exe 106 PID 4840 wrote to memory of 3204 4840 hoie.exe 106 PID 4840 wrote to memory of 3204 4840 hoie.exe 106 PID 3204 wrote to memory of 2204 3204 bhfm.exe 107 PID 3204 wrote to memory of 2204 3204 bhfm.exe 107 PID 3204 wrote to memory of 2204 3204 bhfm.exe 107 PID 2204 wrote to memory of 4472 2204 zkea.exe 108 PID 2204 wrote to memory of 4472 2204 zkea.exe 108 PID 2204 wrote to memory of 4472 2204 zkea.exe 108 PID 4472 wrote to memory of 4540 4472 bkba.exe 109 PID 4472 wrote to memory of 4540 4472 bkba.exe 109 PID 4472 wrote to memory of 4540 4472 bkba.exe 109 PID 4540 wrote to memory of 1572 4540 ynsn.exe 110 PID 4540 wrote to memory of 1572 4540 ynsn.exe 110 PID 4540 wrote to memory of 1572 4540 ynsn.exe 110 PID 1572 wrote to memory of 3956 1572 snpv.exe 111 PID 1572 wrote to memory of 3956 1572 snpv.exe 111 PID 1572 wrote to memory of 3956 1572 snpv.exe 111 PID 3956 wrote to memory of 1656 3956 yqoj.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SysWOW64\pnmg.exeC:\Windows\system32\pnmg.exe 1336 "C:\Users\Admin\AppData\Local\Temp\f420bad96029b024d42e23c5b9300e44_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\utoy.exeC:\Windows\system32\utoy.exe 1228 "C:\Windows\SysWOW64\pnmg.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\sefl.exeC:\Windows\system32\sefl.exe 1220 "C:\Windows\SysWOW64\utoy.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Windows\SysWOW64\mxcu.exeC:\Windows\system32\mxcu.exe 1240 "C:\Windows\SysWOW64\sefl.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\rhbh.exeC:\Windows\system32\rhbh.exe 1244 "C:\Windows\SysWOW64\mxcu.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\mayh.exeC:\Windows\system32\mayh.exe 1256 "C:\Windows\SysWOW64\rhbh.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\jcpu.exeC:\Windows\system32\jcpu.exe 1252 "C:\Windows\SysWOW64\mayh.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\ldmc.exeC:\Windows\system32\ldmc.exe 1396 "C:\Windows\SysWOW64\jcpu.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\jfli.exeC:\Windows\system32\jfli.exe 1408 "C:\Windows\SysWOW64\ldmc.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\lghq.exeC:\Windows\system32\lghq.exe 1272 "C:\Windows\SysWOW64\jfli.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Windows\SysWOW64\iiyd.exeC:\Windows\system32\iiyd.exe 1432 "C:\Windows\SysWOW64\lghq.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\SysWOW64\cjvd.exeC:\Windows\system32\cjvd.exe 1292 "C:\Windows\SysWOW64\iiyd.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\SysWOW64\ilur.exeC:\Windows\system32\ilur.exe 1372 "C:\Windows\SysWOW64\cjvd.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3852 -
C:\Windows\SysWOW64\cerz.exeC:\Windows\system32\cerz.exe 1448 "C:\Windows\SysWOW64\ilur.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\hoie.exeC:\Windows\system32\hoie.exe 1380 "C:\Windows\SysWOW64\cerz.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\bhfm.exeC:\Windows\system32\bhfm.exe 1312 "C:\Windows\SysWOW64\hoie.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3204 -
C:\Windows\SysWOW64\zkea.exeC:\Windows\system32\zkea.exe 1308 "C:\Windows\SysWOW64\bhfm.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\bkba.exeC:\Windows\system32\bkba.exe 1344 "C:\Windows\SysWOW64\zkea.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\SysWOW64\ynsn.exeC:\Windows\system32\ynsn.exe 1348 "C:\Windows\SysWOW64\bkba.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\snpv.exeC:\Windows\system32\snpv.exe 1356 "C:\Windows\SysWOW64\ynsn.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\yqoj.exeC:\Windows\system32\yqoj.exe 1352 "C:\Windows\SysWOW64\snpv.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\SysWOW64\sqlj.exeC:\Windows\system32\sqlj.exe 1512 "C:\Windows\SysWOW64\yqoj.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\xtcw.exeC:\Windows\system32\xtcw.exe 1400 "C:\Windows\SysWOW64\sqlj.exe"24⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4648 -
C:\Windows\SysWOW64\rlyw.exeC:\Windows\system32\rlyw.exe 1412 "C:\Windows\SysWOW64\xtcw.exe"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2692
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
477KB
MD5f420bad96029b024d42e23c5b9300e44
SHA179ef3ab63be198ed25851febee5c3bc603dc1d7a
SHA25617b0f65a3acf878d72123a1648ce0490307ff176abf2117cb23b9ca30417a02e
SHA512f962d6aeb2bb8e0a1a00a86dd709152542c9dd95750b062da6a86eec7b743e7e8610714663753530497219b21e0f37b8a4a1de204a638a0778cbd1d1e244d370