Analysis
-
max time kernel
148s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 17:10
Behavioral task
behavioral1
Sample
a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe
Resource
win7-20241023-en
General
-
Target
a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe
-
Size
560KB
-
MD5
a8daa4f3111c5aa6c21a3c0ac67968c9
-
SHA1
41001b0359cbc0bec0fa6e39b888de14a186f289
-
SHA256
1adb08c84494b15cdb7830cc1fbf690e31f22d5eacb6fb16c9396c0139b67b29
-
SHA512
f163cf9bbdb23e8e8e97b1cfaae5b0b7c334b8bc96dbfacf0da5e205e4d13b032a93de43679a6e4ab237a1732576972453cca4d9e210818f1f686d9d11c463ee
-
SSDEEP
12288:m/cdJ4raKxeQ9tEl9r5mZkxAjH7BWZSJy6FRotthxN:m/cH4zi9N8aAz7hRIPN
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 5 IoCs
pid Process 2512 igfsfds.exe 2060 igfsfds.exe 1796 igfsfds.exe 896 igfsfds.exe 2072 igfsfds.exe -
Identifies Wine through registry keys 2 TTPs 6 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine igfsfds.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine igfsfds.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine igfsfds.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine igfsfds.exe Key opened \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Wine igfsfds.exe -
Loads dropped DLL 10 IoCs
pid Process 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2512 igfsfds.exe 2512 igfsfds.exe 2060 igfsfds.exe 2060 igfsfds.exe 1796 igfsfds.exe 1796 igfsfds.exe 896 igfsfds.exe 896 igfsfds.exe -
resource yara_rule behavioral1/memory/2140-0-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2140-2-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2140-3-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2512-17-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/files/0x000d000000012281-16.dat themida behavioral1/memory/2140-13-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2140-12-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2512-18-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2512-19-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2512-20-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2512-22-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2512-23-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2512-24-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2512-25-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2512-26-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2512-27-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2512-28-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2060-34-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2512-33-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2060-36-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2060-35-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2060-37-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2060-38-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2060-39-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2060-40-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2060-41-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2060-42-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2060-43-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2060-44-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/1796-50-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2060-49-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/1796-51-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/1796-52-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/1796-53-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/1796-54-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/1796-55-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/1796-56-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/1796-57-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/1796-58-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/1796-59-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/1796-60-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/896-66-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/1796-64-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/896-67-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/896-68-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/896-69-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/896-73-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2072-75-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2072-76-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2072-77-0x0000000000400000-0x000000000061F000-memory.dmp themida behavioral1/memory/2072-78-0x0000000000400000-0x000000000061F000-memory.dmp themida -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\SysWOW64\igfsfds.exe a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\igfsfds.exe a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe File created C:\Windows\SysWOW64\igfsfds.exe igfsfds.exe File created C:\Windows\SysWOW64\igfsfds.exe igfsfds.exe File created C:\Windows\SysWOW64\igfsfds.exe igfsfds.exe File created C:\Windows\SysWOW64\igfsfds.exe igfsfds.exe File created C:\Windows\SysWOW64\igfsfds.exe igfsfds.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfsfds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfsfds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfsfds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language igfsfds.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 2512 igfsfds.exe 2512 igfsfds.exe 2512 igfsfds.exe 2512 igfsfds.exe 2512 igfsfds.exe 2512 igfsfds.exe 2512 igfsfds.exe 2512 igfsfds.exe 2512 igfsfds.exe 2512 igfsfds.exe 2512 igfsfds.exe 2512 igfsfds.exe 2512 igfsfds.exe 2060 igfsfds.exe 2060 igfsfds.exe 2060 igfsfds.exe 2060 igfsfds.exe 2060 igfsfds.exe 2060 igfsfds.exe 2060 igfsfds.exe 2060 igfsfds.exe 2060 igfsfds.exe 2060 igfsfds.exe 2060 igfsfds.exe 2060 igfsfds.exe 2060 igfsfds.exe 1796 igfsfds.exe 1796 igfsfds.exe 1796 igfsfds.exe 1796 igfsfds.exe 1796 igfsfds.exe 1796 igfsfds.exe 1796 igfsfds.exe 1796 igfsfds.exe 1796 igfsfds.exe 1796 igfsfds.exe 1796 igfsfds.exe 1796 igfsfds.exe 1796 igfsfds.exe 896 igfsfds.exe 896 igfsfds.exe 896 igfsfds.exe 896 igfsfds.exe 896 igfsfds.exe 896 igfsfds.exe 896 igfsfds.exe 896 igfsfds.exe 896 igfsfds.exe 896 igfsfds.exe 896 igfsfds.exe 896 igfsfds.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 2140 wrote to memory of 2512 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2512 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2512 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 30 PID 2140 wrote to memory of 2512 2140 a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe 30 PID 2512 wrote to memory of 2060 2512 igfsfds.exe 32 PID 2512 wrote to memory of 2060 2512 igfsfds.exe 32 PID 2512 wrote to memory of 2060 2512 igfsfds.exe 32 PID 2512 wrote to memory of 2060 2512 igfsfds.exe 32 PID 2060 wrote to memory of 1796 2060 igfsfds.exe 33 PID 2060 wrote to memory of 1796 2060 igfsfds.exe 33 PID 2060 wrote to memory of 1796 2060 igfsfds.exe 33 PID 2060 wrote to memory of 1796 2060 igfsfds.exe 33 PID 1796 wrote to memory of 896 1796 igfsfds.exe 34 PID 1796 wrote to memory of 896 1796 igfsfds.exe 34 PID 1796 wrote to memory of 896 1796 igfsfds.exe 34 PID 1796 wrote to memory of 896 1796 igfsfds.exe 34 PID 896 wrote to memory of 2072 896 igfsfds.exe 35 PID 896 wrote to memory of 2072 896 igfsfds.exe 35 PID 896 wrote to memory of 2072 896 igfsfds.exe 35 PID 896 wrote to memory of 2072 896 igfsfds.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\igfsfds.exeC:\Windows\system32\igfsfds.exe -bai C:\Users\Admin\AppData\Local\Temp\a8daa4f3111c5aa6c21a3c0ac67968c9_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\igfsfds.exeC:\Windows\system32\igfsfds.exe -bai C:\Windows\SysWOW64\igfsfds.exe3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\igfsfds.exeC:\Windows\system32\igfsfds.exe -bai C:\Windows\SysWOW64\igfsfds.exe4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\igfsfds.exeC:\Windows\system32\igfsfds.exe -bai C:\Windows\SysWOW64\igfsfds.exe5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\SysWOW64\igfsfds.exeC:\Windows\system32\igfsfds.exe -bai C:\Windows\SysWOW64\igfsfds.exe6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Drops file in System32 directory
PID:2072
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
560KB
MD5a8daa4f3111c5aa6c21a3c0ac67968c9
SHA141001b0359cbc0bec0fa6e39b888de14a186f289
SHA2561adb08c84494b15cdb7830cc1fbf690e31f22d5eacb6fb16c9396c0139b67b29
SHA512f163cf9bbdb23e8e8e97b1cfaae5b0b7c334b8bc96dbfacf0da5e205e4d13b032a93de43679a6e4ab237a1732576972453cca4d9e210818f1f686d9d11c463ee