Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe
-
Size
244KB
-
MD5
a9b26d76d855c2427813d22600ba797a
-
SHA1
8f5e4c29157bbe9691bf625ed5ea72a34cf86eec
-
SHA256
1eda80aaef0a7d3cdc41e4ad93dba17a5731ca77d9be6efb297634b135d6705f
-
SHA512
b98d10ead941c78dd30cc70d2f63133089d5619f0e529e33163b619fcaa6fde09a310c65d2ed6e68be3315e436501c2ac0d809690494266a39eecc3baa17e1da
-
SSDEEP
6144:Y2MeMBlZXpUHLO7OGCdU8Iz3zPobd8EEEEEEEEEEEEEEEEEEEO:Y8MBlgrO7OGseiu
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 2564 wingate32.exe 2744 wingate32.exe 2888 wingate32.exe 2672 wingate32.exe 1120 wingate32.exe 1668 wingate32.exe 1736 wingate32.exe 2140 wingate32.exe 660 wingate32.exe 1916 wingate32.exe -
Loads dropped DLL 20 IoCs
pid Process 1548 a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe 1548 a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe 2564 wingate32.exe 2564 wingate32.exe 2744 wingate32.exe 2744 wingate32.exe 2888 wingate32.exe 2888 wingate32.exe 2672 wingate32.exe 2672 wingate32.exe 1120 wingate32.exe 1120 wingate32.exe 1668 wingate32.exe 1668 wingate32.exe 1736 wingate32.exe 1736 wingate32.exe 2140 wingate32.exe 2140 wingate32.exe 660 wingate32.exe 660 wingate32.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2564 1548 a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe 30 PID 1548 wrote to memory of 2564 1548 a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe 30 PID 1548 wrote to memory of 2564 1548 a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe 30 PID 1548 wrote to memory of 2564 1548 a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe 30 PID 2564 wrote to memory of 2744 2564 wingate32.exe 32 PID 2564 wrote to memory of 2744 2564 wingate32.exe 32 PID 2564 wrote to memory of 2744 2564 wingate32.exe 32 PID 2564 wrote to memory of 2744 2564 wingate32.exe 32 PID 2744 wrote to memory of 2888 2744 wingate32.exe 33 PID 2744 wrote to memory of 2888 2744 wingate32.exe 33 PID 2744 wrote to memory of 2888 2744 wingate32.exe 33 PID 2744 wrote to memory of 2888 2744 wingate32.exe 33 PID 2888 wrote to memory of 2672 2888 wingate32.exe 34 PID 2888 wrote to memory of 2672 2888 wingate32.exe 34 PID 2888 wrote to memory of 2672 2888 wingate32.exe 34 PID 2888 wrote to memory of 2672 2888 wingate32.exe 34 PID 2672 wrote to memory of 1120 2672 wingate32.exe 35 PID 2672 wrote to memory of 1120 2672 wingate32.exe 35 PID 2672 wrote to memory of 1120 2672 wingate32.exe 35 PID 2672 wrote to memory of 1120 2672 wingate32.exe 35 PID 1120 wrote to memory of 1668 1120 wingate32.exe 36 PID 1120 wrote to memory of 1668 1120 wingate32.exe 36 PID 1120 wrote to memory of 1668 1120 wingate32.exe 36 PID 1120 wrote to memory of 1668 1120 wingate32.exe 36 PID 1668 wrote to memory of 1736 1668 wingate32.exe 37 PID 1668 wrote to memory of 1736 1668 wingate32.exe 37 PID 1668 wrote to memory of 1736 1668 wingate32.exe 37 PID 1668 wrote to memory of 1736 1668 wingate32.exe 37 PID 1736 wrote to memory of 2140 1736 wingate32.exe 38 PID 1736 wrote to memory of 2140 1736 wingate32.exe 38 PID 1736 wrote to memory of 2140 1736 wingate32.exe 38 PID 1736 wrote to memory of 2140 1736 wingate32.exe 38 PID 2140 wrote to memory of 660 2140 wingate32.exe 39 PID 2140 wrote to memory of 660 2140 wingate32.exe 39 PID 2140 wrote to memory of 660 2140 wingate32.exe 39 PID 2140 wrote to memory of 660 2140 wingate32.exe 39 PID 660 wrote to memory of 1916 660 wingate32.exe 40 PID 660 wrote to memory of 1916 660 wingate32.exe 40 PID 660 wrote to memory of 1916 660 wingate32.exe 40 PID 660 wrote to memory of 1916 660 wingate32.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 532 "C:\Users\Admin\AppData\Local\Temp\a9b26d76d855c2427813d22600ba797a_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 524 "C:\Windows\SysWOW64\wingate32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 540 "C:\Windows\SysWOW64\wingate32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 548 "C:\Windows\SysWOW64\wingate32.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 536 "C:\Windows\SysWOW64\wingate32.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 528 "C:\Windows\SysWOW64\wingate32.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 552 "C:\Windows\SysWOW64\wingate32.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 544 "C:\Windows\SysWOW64\wingate32.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 556 "C:\Windows\SysWOW64\wingate32.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 568 "C:\Windows\SysWOW64\wingate32.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1916
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5a9b26d76d855c2427813d22600ba797a
SHA18f5e4c29157bbe9691bf625ed5ea72a34cf86eec
SHA2561eda80aaef0a7d3cdc41e4ad93dba17a5731ca77d9be6efb297634b135d6705f
SHA512b98d10ead941c78dd30cc70d2f63133089d5619f0e529e33163b619fcaa6fde09a310c65d2ed6e68be3315e436501c2ac0d809690494266a39eecc3baa17e1da