Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 20:27
Behavioral task
behavioral1
Sample
9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe
-
Size
556KB
-
MD5
9db6aac91edecc05b4ce04878fde8dae
-
SHA1
682b224df4beac1a0518736dfcd93474e3a3eb19
-
SHA256
5dbae2032699625724f04f9d853144ff10d2ee913c7f57811ce3a5e448a4bc83
-
SHA512
5128e02530518707717ee3ad2d4f2ca4bc285a2127aa5225313ec36419f65d4df5c8e366cd9ff89af4e3e422d562c9a0fc5e95d6b0acc26604d35185857dc03e
-
SSDEEP
12288:XOjonaDXZ+iA2VuzIeJt3eDiPC0opTqTDqbGUJOVxtm3Sx3Rt30c:i7Do0010qT2pJOVxj1Rt3
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 5 IoCs
pid Process 2736 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 708 igfsfdfsd32.exe 3064 igfsfdfsd32.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine igfsfdfsd32.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine igfsfdfsd32.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine igfsfdfsd32.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine igfsfdfsd32.exe Key opened \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Wine igfsfdfsd32.exe -
Loads dropped DLL 10 IoCs
pid Process 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2736 igfsfdfsd32.exe 2736 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 708 igfsfdfsd32.exe 708 igfsfdfsd32.exe -
resource yara_rule behavioral1/memory/2072-0-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2072-2-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2072-3-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2072-4-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/files/0x00070000000120fe-8.dat themida behavioral1/memory/2072-12-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2736-17-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2072-16-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2736-19-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2736-20-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2736-21-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2736-23-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2736-24-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2736-25-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2736-26-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2736-27-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2736-28-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2736-29-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1112-35-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/2736-33-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1112-36-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1112-37-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1112-38-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1112-39-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1112-40-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1112-41-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1112-42-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1112-43-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1112-44-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1112-45-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1112-49-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1512-51-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1512-52-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1512-53-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1512-54-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1512-55-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1512-56-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1512-57-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1512-58-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1512-59-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1512-60-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1512-61-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/1512-65-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/708-67-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/708-68-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/708-69-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/3064-75-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/708-73-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/3064-76-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/3064-77-0x0000000000400000-0x0000000000617000-memory.dmp themida behavioral1/memory/3064-78-0x0000000000400000-0x0000000000617000-memory.dmp themida -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfsfdfsd32.exe igfsfdfsd32.exe File created C:\Windows\SysWOW64\igfsfdfsd32.exe igfsfdfsd32.exe File created C:\Windows\SysWOW64\igfsfdfsd32.exe igfsfdfsd32.exe File created C:\Windows\SysWOW64\igfsfdfsd32.exe igfsfdfsd32.exe File created C:\Windows\SysWOW64\igfsfdfsd32.exe 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfsfdfsd32.exe 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfsfdfsd32.exe igfsfdfsd32.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfsfdfsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfsfdfsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfsfdfsd32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfsfdfsd32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 2736 igfsfdfsd32.exe 2736 igfsfdfsd32.exe 2736 igfsfdfsd32.exe 2736 igfsfdfsd32.exe 2736 igfsfdfsd32.exe 2736 igfsfdfsd32.exe 2736 igfsfdfsd32.exe 2736 igfsfdfsd32.exe 2736 igfsfdfsd32.exe 2736 igfsfdfsd32.exe 2736 igfsfdfsd32.exe 2736 igfsfdfsd32.exe 2736 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1112 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 1512 igfsfdfsd32.exe 708 igfsfdfsd32.exe 708 igfsfdfsd32.exe 708 igfsfdfsd32.exe 708 igfsfdfsd32.exe 708 igfsfdfsd32.exe 708 igfsfdfsd32.exe 708 igfsfdfsd32.exe 708 igfsfdfsd32.exe 708 igfsfdfsd32.exe 708 igfsfdfsd32.exe 708 igfsfdfsd32.exe 708 igfsfdfsd32.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2736 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2736 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2736 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 30 PID 2072 wrote to memory of 2736 2072 9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe 30 PID 2736 wrote to memory of 1112 2736 igfsfdfsd32.exe 32 PID 2736 wrote to memory of 1112 2736 igfsfdfsd32.exe 32 PID 2736 wrote to memory of 1112 2736 igfsfdfsd32.exe 32 PID 2736 wrote to memory of 1112 2736 igfsfdfsd32.exe 32 PID 1112 wrote to memory of 1512 1112 igfsfdfsd32.exe 33 PID 1112 wrote to memory of 1512 1112 igfsfdfsd32.exe 33 PID 1112 wrote to memory of 1512 1112 igfsfdfsd32.exe 33 PID 1112 wrote to memory of 1512 1112 igfsfdfsd32.exe 33 PID 1512 wrote to memory of 708 1512 igfsfdfsd32.exe 34 PID 1512 wrote to memory of 708 1512 igfsfdfsd32.exe 34 PID 1512 wrote to memory of 708 1512 igfsfdfsd32.exe 34 PID 1512 wrote to memory of 708 1512 igfsfdfsd32.exe 34 PID 708 wrote to memory of 3064 708 igfsfdfsd32.exe 35 PID 708 wrote to memory of 3064 708 igfsfdfsd32.exe 35 PID 708 wrote to memory of 3064 708 igfsfdfsd32.exe 35 PID 708 wrote to memory of 3064 708 igfsfdfsd32.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\igfsfdfsd32.exeC:\Windows\system32\igfsfdfsd32.exe -bai C:\Users\Admin\AppData\Local\Temp\9db6aac91edecc05b4ce04878fde8dae_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\igfsfdfsd32.exeC:\Windows\system32\igfsfdfsd32.exe -bai C:\Windows\SysWOW64\igfsfdfsd32.exe3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Windows\SysWOW64\igfsfdfsd32.exeC:\Windows\system32\igfsfdfsd32.exe -bai C:\Windows\SysWOW64\igfsfdfsd32.exe4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\igfsfdfsd32.exeC:\Windows\system32\igfsfdfsd32.exe -bai C:\Windows\SysWOW64\igfsfdfsd32.exe5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:708 -
C:\Windows\SysWOW64\igfsfdfsd32.exeC:\Windows\system32\igfsfdfsd32.exe -bai C:\Windows\SysWOW64\igfsfdfsd32.exe6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:3064
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
556KB
MD59db6aac91edecc05b4ce04878fde8dae
SHA1682b224df4beac1a0518736dfcd93474e3a3eb19
SHA2565dbae2032699625724f04f9d853144ff10d2ee913c7f57811ce3a5e448a4bc83
SHA5125128e02530518707717ee3ad2d4f2ca4bc285a2127aa5225313ec36419f65d4df5c8e366cd9ff89af4e3e422d562c9a0fc5e95d6b0acc26604d35185857dc03e