Analysis
-
max time kernel
147s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 09:04
Static task
static1
Behavioral task
behavioral1
Sample
a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe
-
Size
159KB
-
MD5
a709698a414459ae38dd032706bcc1c4
-
SHA1
cd0d8b0261145931c34134b290663795903a0857
-
SHA256
d71cf481df4c1e1b923ec7455ce4c18419b9f08975f49a898d35c0f9b8af776e
-
SHA512
4c2f1c19d8f16d4c605deb148c67e7ae24057d3cceb94b0e427defa91e12661582dd747a86c9e72c0ad9b3db8501fe86fded5827859cf380280dcc986c2d221c
-
SSDEEP
3072:S2Cn0lzRlAVeXveI9CFz/mLc2CZQsWFUVZCOTZNGjBJuG/Xc:S22gzRC0XveI9KuLcvZQhutT/Sf//Xc
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 3584 windupdate.exe 1072 windupdate.exe 4844 windupdate.exe 4924 windupdate.exe 2808 windupdate.exe 5004 windupdate.exe 1564 windupdate.exe 4952 windupdate.exe 2940 windupdate.exe 2516 windupdate.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\windupdate.exe a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File opened for modification C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe File created C:\Windows\SysWOW64\windupdate.exe windupdate.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windupdate.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3980 wrote to memory of 3584 3980 a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe 82 PID 3980 wrote to memory of 3584 3980 a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe 82 PID 3980 wrote to memory of 3584 3980 a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe 82 PID 3584 wrote to memory of 1072 3584 windupdate.exe 90 PID 3584 wrote to memory of 1072 3584 windupdate.exe 90 PID 3584 wrote to memory of 1072 3584 windupdate.exe 90 PID 1072 wrote to memory of 4844 1072 windupdate.exe 92 PID 1072 wrote to memory of 4844 1072 windupdate.exe 92 PID 1072 wrote to memory of 4844 1072 windupdate.exe 92 PID 4844 wrote to memory of 4924 4844 windupdate.exe 94 PID 4844 wrote to memory of 4924 4844 windupdate.exe 94 PID 4844 wrote to memory of 4924 4844 windupdate.exe 94 PID 4924 wrote to memory of 2808 4924 windupdate.exe 95 PID 4924 wrote to memory of 2808 4924 windupdate.exe 95 PID 4924 wrote to memory of 2808 4924 windupdate.exe 95 PID 2808 wrote to memory of 5004 2808 windupdate.exe 96 PID 2808 wrote to memory of 5004 2808 windupdate.exe 96 PID 2808 wrote to memory of 5004 2808 windupdate.exe 96 PID 5004 wrote to memory of 1564 5004 windupdate.exe 97 PID 5004 wrote to memory of 1564 5004 windupdate.exe 97 PID 5004 wrote to memory of 1564 5004 windupdate.exe 97 PID 1564 wrote to memory of 4952 1564 windupdate.exe 98 PID 1564 wrote to memory of 4952 1564 windupdate.exe 98 PID 1564 wrote to memory of 4952 1564 windupdate.exe 98 PID 4952 wrote to memory of 2940 4952 windupdate.exe 99 PID 4952 wrote to memory of 2940 4952 windupdate.exe 99 PID 4952 wrote to memory of 2940 4952 windupdate.exe 99 PID 2940 wrote to memory of 2516 2940 windupdate.exe 100 PID 2940 wrote to memory of 2516 2940 windupdate.exe 100 PID 2940 wrote to memory of 2516 2940 windupdate.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 1180 "C:\Users\Admin\AppData\Local\Temp\a709698a414459ae38dd032706bcc1c4_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 1148 "C:\Windows\SysWOW64\windupdate.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 1120 "C:\Windows\SysWOW64\windupdate.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 1116 "C:\Windows\SysWOW64\windupdate.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 1128 "C:\Windows\SysWOW64\windupdate.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 1132 "C:\Windows\SysWOW64\windupdate.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 1136 "C:\Windows\SysWOW64\windupdate.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 1144 "C:\Windows\SysWOW64\windupdate.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 1100 "C:\Windows\SysWOW64\windupdate.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\windupdate.exeC:\Windows\system32\windupdate.exe 1152 "C:\Windows\SysWOW64\windupdate.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2516
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
159KB
MD5a709698a414459ae38dd032706bcc1c4
SHA1cd0d8b0261145931c34134b290663795903a0857
SHA256d71cf481df4c1e1b923ec7455ce4c18419b9f08975f49a898d35c0f9b8af776e
SHA5124c2f1c19d8f16d4c605deb148c67e7ae24057d3cceb94b0e427defa91e12661582dd747a86c9e72c0ad9b3db8501fe86fded5827859cf380280dcc986c2d221c