Analysis
-
max time kernel
137s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 06:47
Static task
static1
Behavioral task
behavioral1
Sample
f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe
-
Size
294KB
-
MD5
f7ccad9ff12aa38a3b2b9887485cad56
-
SHA1
78d71be9e51d25754bd148b1ac168dbcb92c6184
-
SHA256
7fc428d3d81f070ddadaa04b22268f0c48513c07a6cb8bb981c5a0b53c7a5ee3
-
SHA512
8e6c629637260e76c802c219442d2de34bb08f3dab26a77376d725eb31c888e49bae58176197e2660d0f06a1806c13e7eebebadc5ae908be963c6aabca5438f1
-
SSDEEP
6144:FpjkUdnUwHP0Ea+DppEBpZ+uIb1u1wyguu:FpjkUBLJa+DTYD+n6Lru
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 20 IoCs
pid Process 2472 stmea.exe 2384 stmea.exe 2680 stmea.exe 2540 stmea.exe 2648 stmea.exe 2528 stmea.exe 2264 stmea.exe 2060 stmea.exe 2320 stmea.exe 324 stmea.exe 1580 stmea.exe 2276 stmea.exe 380 stmea.exe 2908 stmea.exe 1776 stmea.exe 1780 stmea.exe 1520 stmea.exe 664 stmea.exe 1920 stmea.exe 776 stmea.exe -
Loads dropped DLL 21 IoCs
pid Process 2488 f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe 2488 f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe 2472 stmea.exe 2384 stmea.exe 2384 stmea.exe 2540 stmea.exe 2540 stmea.exe 2528 stmea.exe 2528 stmea.exe 2060 stmea.exe 2060 stmea.exe 324 stmea.exe 324 stmea.exe 2276 stmea.exe 2276 stmea.exe 2908 stmea.exe 2908 stmea.exe 1780 stmea.exe 1780 stmea.exe 664 stmea.exe 664 stmea.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\stmea.exe f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\stmea.exe stmea.exe File created C:\Windows\SysWOW64\stmea.exe stmea.exe File opened for modification C:\Windows\SysWOW64\stmea.exe stmea.exe File created C:\Windows\SysWOW64\stmea.exe stmea.exe File created C:\Windows\SysWOW64\stmea.exe stmea.exe File created C:\Windows\SysWOW64\stmea.exe stmea.exe File opened for modification C:\Windows\SysWOW64\stmea.exe stmea.exe File created C:\Windows\SysWOW64\stmea.exe stmea.exe File opened for modification C:\Windows\SysWOW64\stmea.exe stmea.exe File opened for modification C:\Windows\SysWOW64\stmea.exe stmea.exe File created C:\Windows\SysWOW64\stmea.exe stmea.exe File created C:\Windows\SysWOW64\stmea.exe stmea.exe File opened for modification C:\Windows\SysWOW64\stmea.exe stmea.exe File opened for modification C:\Windows\SysWOW64\stmea.exe stmea.exe File created C:\Windows\SysWOW64\stmea.exe stmea.exe File created C:\Windows\SysWOW64\stmea.exe stmea.exe File opened for modification C:\Windows\SysWOW64\stmea.exe stmea.exe File opened for modification C:\Windows\SysWOW64\stmea.exe f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\stmea.exe stmea.exe File opened for modification C:\Windows\SysWOW64\stmea.exe stmea.exe File created C:\Windows\SysWOW64\stmea.exe stmea.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 3048 set thread context of 2488 3048 f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe 30 PID 2472 set thread context of 2384 2472 stmea.exe 32 PID 2680 set thread context of 2540 2680 stmea.exe 35 PID 2648 set thread context of 2528 2648 stmea.exe 37 PID 2264 set thread context of 2060 2264 stmea.exe 39 PID 2320 set thread context of 324 2320 stmea.exe 41 PID 1580 set thread context of 2276 1580 stmea.exe 43 PID 380 set thread context of 2908 380 stmea.exe 45 PID 1776 set thread context of 1780 1776 stmea.exe 47 PID 1520 set thread context of 664 1520 stmea.exe 49 PID 1920 set thread context of 776 1920 stmea.exe 51 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language stmea.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 2488 3048 f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2488 3048 f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2488 3048 f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2488 3048 f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2488 3048 f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe 30 PID 3048 wrote to memory of 2488 3048 f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe 30 PID 2488 wrote to memory of 2472 2488 f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2472 2488 f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2472 2488 f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe 31 PID 2488 wrote to memory of 2472 2488 f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe 31 PID 2472 wrote to memory of 2384 2472 stmea.exe 32 PID 2472 wrote to memory of 2384 2472 stmea.exe 32 PID 2472 wrote to memory of 2384 2472 stmea.exe 32 PID 2472 wrote to memory of 2384 2472 stmea.exe 32 PID 2472 wrote to memory of 2384 2472 stmea.exe 32 PID 2472 wrote to memory of 2384 2472 stmea.exe 32 PID 2384 wrote to memory of 2680 2384 stmea.exe 34 PID 2384 wrote to memory of 2680 2384 stmea.exe 34 PID 2384 wrote to memory of 2680 2384 stmea.exe 34 PID 2384 wrote to memory of 2680 2384 stmea.exe 34 PID 2680 wrote to memory of 2540 2680 stmea.exe 35 PID 2680 wrote to memory of 2540 2680 stmea.exe 35 PID 2680 wrote to memory of 2540 2680 stmea.exe 35 PID 2680 wrote to memory of 2540 2680 stmea.exe 35 PID 2680 wrote to memory of 2540 2680 stmea.exe 35 PID 2680 wrote to memory of 2540 2680 stmea.exe 35 PID 2540 wrote to memory of 2648 2540 stmea.exe 36 PID 2540 wrote to memory of 2648 2540 stmea.exe 36 PID 2540 wrote to memory of 2648 2540 stmea.exe 36 PID 2540 wrote to memory of 2648 2540 stmea.exe 36 PID 2648 wrote to memory of 2528 2648 stmea.exe 37 PID 2648 wrote to memory of 2528 2648 stmea.exe 37 PID 2648 wrote to memory of 2528 2648 stmea.exe 37 PID 2648 wrote to memory of 2528 2648 stmea.exe 37 PID 2648 wrote to memory of 2528 2648 stmea.exe 37 PID 2648 wrote to memory of 2528 2648 stmea.exe 37 PID 2528 wrote to memory of 2264 2528 stmea.exe 38 PID 2528 wrote to memory of 2264 2528 stmea.exe 38 PID 2528 wrote to memory of 2264 2528 stmea.exe 38 PID 2528 wrote to memory of 2264 2528 stmea.exe 38 PID 2264 wrote to memory of 2060 2264 stmea.exe 39 PID 2264 wrote to memory of 2060 2264 stmea.exe 39 PID 2264 wrote to memory of 2060 2264 stmea.exe 39 PID 2264 wrote to memory of 2060 2264 stmea.exe 39 PID 2264 wrote to memory of 2060 2264 stmea.exe 39 PID 2264 wrote to memory of 2060 2264 stmea.exe 39 PID 2060 wrote to memory of 2320 2060 stmea.exe 40 PID 2060 wrote to memory of 2320 2060 stmea.exe 40 PID 2060 wrote to memory of 2320 2060 stmea.exe 40 PID 2060 wrote to memory of 2320 2060 stmea.exe 40 PID 2320 wrote to memory of 324 2320 stmea.exe 41 PID 2320 wrote to memory of 324 2320 stmea.exe 41 PID 2320 wrote to memory of 324 2320 stmea.exe 41 PID 2320 wrote to memory of 324 2320 stmea.exe 41 PID 2320 wrote to memory of 324 2320 stmea.exe 41 PID 2320 wrote to memory of 324 2320 stmea.exe 41 PID 324 wrote to memory of 1580 324 stmea.exe 42 PID 324 wrote to memory of 1580 324 stmea.exe 42 PID 324 wrote to memory of 1580 324 stmea.exe 42 PID 324 wrote to memory of 1580 324 stmea.exe 42 PID 1580 wrote to memory of 2276 1580 stmea.exe 43 PID 1580 wrote to memory of 2276 1580 stmea.exe 43 PID 1580 wrote to memory of 2276 1580 stmea.exe 43 PID 1580 wrote to memory of 2276 1580 stmea.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\system32\stmea.exe 480 "C:\Users\Admin\AppData\Local\Temp\f7ccad9ff12aa38a3b2b9887485cad56_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\SysWOW64\stmea.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\system32\stmea.exe 524 "C:\Windows\SysWOW64\stmea.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\SysWOW64\stmea.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\system32\stmea.exe 524 "C:\Windows\SysWOW64\stmea.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\SysWOW64\stmea.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\system32\stmea.exe 524 "C:\Windows\SysWOW64\stmea.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\SysWOW64\stmea.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\system32\stmea.exe 536 "C:\Windows\SysWOW64\stmea.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\SysWOW64\stmea.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\system32\stmea.exe 528 "C:\Windows\SysWOW64\stmea.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\SysWOW64\stmea.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\system32\stmea.exe 524 "C:\Windows\SysWOW64\stmea.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:380 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\SysWOW64\stmea.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\system32\stmea.exe 524 "C:\Windows\SysWOW64\stmea.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\SysWOW64\stmea.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\system32\stmea.exe 524 "C:\Windows\SysWOW64\stmea.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\SysWOW64\stmea.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:664 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\system32\stmea.exe 524 "C:\Windows\SysWOW64\stmea.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Windows\SysWOW64\stmea.exeC:\Windows\SysWOW64\stmea.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:776
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
294KB
MD5f7ccad9ff12aa38a3b2b9887485cad56
SHA178d71be9e51d25754bd148b1ac168dbcb92c6184
SHA2567fc428d3d81f070ddadaa04b22268f0c48513c07a6cb8bb981c5a0b53c7a5ee3
SHA5128e6c629637260e76c802c219442d2de34bb08f3dab26a77376d725eb31c888e49bae58176197e2660d0f06a1806c13e7eebebadc5ae908be963c6aabca5438f1