Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 09:04
Static task
static1
Behavioral task
behavioral1
Sample
a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe
-
Size
159KB
-
MD5
a709698a414459ae38dd032706bcc1c4
-
SHA1
cd0d8b0261145931c34134b290663795903a0857
-
SHA256
d71cf481df4c1e1b923ec7455ce4c18419b9f08975f49a898d35c0f9b8af776e
-
SHA512
4c2f1c19d8f16d4c605deb148c67e7ae24057d3cceb94b0e427defa91e12661582dd747a86c9e72c0ad9b3db8501fe86fded5827859cf380280dcc986c2d221c
-
SSDEEP
3072:S2Cn0lzRlAVeXveI9CFz/mLc2CZQsWFUVZCOTZNGjBJuG/Xc:S22gzRC0XveI9KuLcvZQhutT/Sf//Xc
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 780 windupdate.exe 2172 windupdate.exe 2196 windupdate.exe 2592 windupdate.exe 2832 windupdate.exe 892 windupdate.exe 828 windupdate.exe 2436 windupdate.exe 904 windupdate.exe 2024 windupdate.exe -
Loads dropped DLL 42 IoCs
pid Process 2476 a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe 780 windupdate.exe 780 windupdate.exe 780 windupdate.exe 860 Process not Found 860 Process not Found 780 windupdate.exe 2172 windupdate.exe 2172 windupdate.exe 2172 windupdate.exe 2172 windupdate.exe 2196 windupdate.exe 2196 windupdate.exe 2196 windupdate.exe 2196 windupdate.exe 2592 windupdate.exe 2592 windupdate.exe 2592 windupdate.exe 2592 windupdate.exe 2832 windupdate.exe 2832 windupdate.exe 2832 windupdate.exe 2832 windupdate.exe 892 windupdate.exe 892 windupdate.exe 892 windupdate.exe 892 windupdate.exe 828 windupdate.exe 828 windupdate.exe 828 windupdate.exe 828 windupdate.exe 2436 windupdate.exe 2436 windupdate.exe 2436 windupdate.exe 2436 windupdate.exe 904 windupdate.exe 904 windupdate.exe 904 windupdate.exe 904 windupdate.exe 2024 windupdate.exe 2024 windupdate.exe 2024 windupdate.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\windupdate.exe a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2476 wrote to memory of 780 2476 a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe 31 PID 2476 wrote to memory of 780 2476 a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe 31 PID 2476 wrote to memory of 780 2476 a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe 31 PID 2476 wrote to memory of 780 2476 a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe 31 PID 2476 wrote to memory of 780 2476 a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe 31 PID 2476 wrote to memory of 780 2476 a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe 31 PID 2476 wrote to memory of 780 2476 a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe 31 PID 780 wrote to memory of 2172 780 windupdate.exe 32 PID 780 wrote to memory of 2172 780 windupdate.exe 32 PID 780 wrote to memory of 2172 780 windupdate.exe 32 PID 780 wrote to memory of 2172 780 windupdate.exe 32 PID 780 wrote to memory of 2172 780 windupdate.exe 32 PID 780 wrote to memory of 2172 780 windupdate.exe 32 PID 780 wrote to memory of 2172 780 windupdate.exe 32 PID 2172 wrote to memory of 2196 2172 windupdate.exe 33 PID 2172 wrote to memory of 2196 2172 windupdate.exe 33 PID 2172 wrote to memory of 2196 2172 windupdate.exe 33 PID 2172 wrote to memory of 2196 2172 windupdate.exe 33 PID 2172 wrote to memory of 2196 2172 windupdate.exe 33 PID 2172 wrote to memory of 2196 2172 windupdate.exe 33 PID 2172 wrote to memory of 2196 2172 windupdate.exe 33 PID 2196 wrote to memory of 2592 2196 windupdate.exe 34 PID 2196 wrote to memory of 2592 2196 windupdate.exe 34 PID 2196 wrote to memory of 2592 2196 windupdate.exe 34 PID 2196 wrote to memory of 2592 2196 windupdate.exe 34 PID 2196 wrote to memory of 2592 2196 windupdate.exe 34 PID 2196 wrote to memory of 2592 2196 windupdate.exe 34 PID 2196 wrote to memory of 2592 2196 windupdate.exe 34 PID 2592 wrote to memory of 2832 2592 windupdate.exe 35 PID 2592 wrote to memory of 2832 2592 windupdate.exe 35 PID 2592 wrote to memory of 2832 2592 windupdate.exe 35 PID 2592 wrote to memory of 2832 2592 windupdate.exe 35 PID 2592 wrote to memory of 2832 2592 windupdate.exe 35 PID 2592 wrote to memory of 2832 2592 windupdate.exe 35 PID 2592 wrote to memory of 2832 2592 windupdate.exe 35 PID 2832 wrote to memory of 892 2832 windupdate.exe 37 PID 2832 wrote to memory of 892 2832 windupdate.exe 37 PID 2832 wrote to memory of 892 2832 windupdate.exe 37 PID 2832 wrote to memory of 892 2832 windupdate.exe 37 PID 2832 wrote to memory of 892 2832 windupdate.exe 37 PID 2832 wrote to memory of 892 2832 windupdate.exe 37 PID 2832 wrote to memory of 892 2832 windupdate.exe 37 PID 892 wrote to memory of 828 892 windupdate.exe 38 PID 892 wrote to memory of 828 892 windupdate.exe 38 PID 892 wrote to memory of 828 892 windupdate.exe 38 PID 892 wrote to memory of 828 892 windupdate.exe 38 PID 892 wrote to memory of 828 892 windupdate.exe 38 PID 892 wrote to memory of 828 892 windupdate.exe 38 PID 892 wrote to memory of 828 892 windupdate.exe 38 PID 828 wrote to memory of 2436 828 windupdate.exe 39 PID 828 wrote to memory of 2436 828 windupdate.exe 39 PID 828 wrote to memory of 2436 828 windupdate.exe 39 PID 828 wrote to memory of 2436 828 windupdate.exe 39 PID 828 wrote to memory of 2436 828 windupdate.exe 39 PID 828 wrote to memory of 2436 828 windupdate.exe 39 PID 828 wrote to memory of 2436 828 windupdate.exe 39 PID 2436 wrote to memory of 904 2436 windupdate.exe 40 PID 2436 wrote to memory of 904 2436 windupdate.exe 40 PID 2436 wrote to memory of 904 2436 windupdate.exe 40 PID 2436 wrote to memory of 904 2436 windupdate.exe 40 PID 2436 wrote to memory of 904 2436 windupdate.exe 40 PID 2436 wrote to memory of 904 2436 windupdate.exe 40 PID 2436 wrote to memory of 904 2436 windupdate.exe 40 PID 904 wrote to memory of 2024 904 windupdate.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 464 "C:\Users\Admin\AppData\Local\Temp\a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 592 "C:\Windows\SysWOW64\windupdate.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 612 "C:\Windows\SysWOW64\windupdate.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 596 "C:\Windows\SysWOW64\windupdate.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 620 "C:\Windows\SysWOW64\windupdate.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 600 "C:\Windows\SysWOW64\windupdate.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 616 "C:\Windows\SysWOW64\windupdate.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 636 "C:\Windows\SysWOW64\windupdate.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 608 "C:\Windows\SysWOW64\windupdate.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:904 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 628 "C:\Windows\SysWOW64\windupdate.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2024
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD5a709698a414459ae38dd032706bcc1c4
SHA1cd0d8b0261145931c34134b290663795903a0857
SHA256d71cf481df4c1e1b923ec7455ce4c18419b9f08975f49a898d35c0f9b8af776e
SHA5124c2f1c19d8f16d4c605deb148c67e7ae24057d3cceb94b0e427defa91e12661582dd747a86c9e72c0ad9b3db8501fe86fded5827859cf380280dcc986c2d221c