Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe
-
Size
153KB
-
MD5
aa387aaa0b91d9e94474aac00e584365
-
SHA1
459d0ad1a6380154da13f4bcce60da23919a98b2
-
SHA256
12cdebb4fcb3ba8b2a20c02ce2511d313f53c0c22c8cfe04870bb48396f5fdd7
-
SHA512
ab0b20678a81fd19cbf18d364a52df5b60c0428476e0eb19e5ee172702f56a65db4c2d3209e69260e8374c4d5caf2d48020a54d7a2ca40fcc936233ad8b97b21
-
SSDEEP
3072:PfVskFgAFay1Gt9xPUKWUCfTYxSzzdniHlcbLHm7a:PNskFPFaaGtDMv9fnzhniHGby7a
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 2896 winupdat.exe 592 winupdat.exe 2928 winupdat.exe 2948 winupdat.exe 1156 winupdat.exe 2152 winupdat.exe 408 winupdat.exe 1392 winupdat.exe 1292 winupdat.exe 892 winupdat.exe -
Loads dropped DLL 20 IoCs
pid Process 2884 aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe 2884 aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe 2896 winupdat.exe 2896 winupdat.exe 592 winupdat.exe 592 winupdat.exe 2928 winupdat.exe 2928 winupdat.exe 2948 winupdat.exe 2948 winupdat.exe 1156 winupdat.exe 1156 winupdat.exe 2152 winupdat.exe 2152 winupdat.exe 408 winupdat.exe 408 winupdat.exe 1392 winupdat.exe 1392 winupdat.exe 1292 winupdat.exe 1292 winupdat.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File created C:\Windows\SysWOW64\winupdat.exe winupdat.exe File created C:\Windows\SysWOW64\winupdat.exe winupdat.exe File created C:\Windows\SysWOW64\winupdat.exe winupdat.exe File created C:\Windows\SysWOW64\winupdat.exe winupdat.exe File created C:\Windows\SysWOW64\winupdat.exe winupdat.exe File created C:\Windows\SysWOW64\winupdat.exe winupdat.exe File opened for modification C:\Windows\SysWOW64\winupdat.exe winupdat.exe File opened for modification C:\Windows\SysWOW64\winupdat.exe winupdat.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr winupdat.exe File created C:\Windows\SysWOW64\winupdat.exe winupdat.exe File opened for modification C:\Windows\SysWOW64\winupdat.exe winupdat.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr winupdat.exe File opened for modification C:\Windows\SysWOW64\winupdat.exe winupdat.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr winupdat.exe File created C:\windows\SysWOW64\Aquarium-06.scr aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winupdat.exe winupdat.exe File created C:\Windows\SysWOW64\winupdat.exe winupdat.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr winupdat.exe File created C:\Windows\SysWOW64\winupdat.exe aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winupdat.exe winupdat.exe File created C:\Windows\SysWOW64\winupdat.exe winupdat.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr winupdat.exe File opened for modification C:\Windows\SysWOW64\winupdat.exe winupdat.exe File opened for modification C:\Windows\SysWOW64\winupdat.exe winupdat.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr winupdat.exe File opened for modification C:\Windows\SysWOW64\winupdat.exe winupdat.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr winupdat.exe File created C:\Windows\SysWOW64\winupdat.exe winupdat.exe File opened for modification C:\Windows\SysWOW64\winupdat.exe aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr winupdat.exe File opened for modification C:\Windows\SysWOW64\winupdat.exe winupdat.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr winupdat.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdat.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdat.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2884 wrote to memory of 2896 2884 aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe 30 PID 2884 wrote to memory of 2896 2884 aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe 30 PID 2884 wrote to memory of 2896 2884 aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe 30 PID 2884 wrote to memory of 2896 2884 aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe 30 PID 2896 wrote to memory of 592 2896 winupdat.exe 32 PID 2896 wrote to memory of 592 2896 winupdat.exe 32 PID 2896 wrote to memory of 592 2896 winupdat.exe 32 PID 2896 wrote to memory of 592 2896 winupdat.exe 32 PID 592 wrote to memory of 2928 592 winupdat.exe 35 PID 592 wrote to memory of 2928 592 winupdat.exe 35 PID 592 wrote to memory of 2928 592 winupdat.exe 35 PID 592 wrote to memory of 2928 592 winupdat.exe 35 PID 2928 wrote to memory of 2948 2928 winupdat.exe 36 PID 2928 wrote to memory of 2948 2928 winupdat.exe 36 PID 2928 wrote to memory of 2948 2928 winupdat.exe 36 PID 2928 wrote to memory of 2948 2928 winupdat.exe 36 PID 2948 wrote to memory of 1156 2948 winupdat.exe 37 PID 2948 wrote to memory of 1156 2948 winupdat.exe 37 PID 2948 wrote to memory of 1156 2948 winupdat.exe 37 PID 2948 wrote to memory of 1156 2948 winupdat.exe 37 PID 1156 wrote to memory of 2152 1156 winupdat.exe 38 PID 1156 wrote to memory of 2152 1156 winupdat.exe 38 PID 1156 wrote to memory of 2152 1156 winupdat.exe 38 PID 1156 wrote to memory of 2152 1156 winupdat.exe 38 PID 2152 wrote to memory of 408 2152 winupdat.exe 39 PID 2152 wrote to memory of 408 2152 winupdat.exe 39 PID 2152 wrote to memory of 408 2152 winupdat.exe 39 PID 2152 wrote to memory of 408 2152 winupdat.exe 39 PID 408 wrote to memory of 1392 408 winupdat.exe 40 PID 408 wrote to memory of 1392 408 winupdat.exe 40 PID 408 wrote to memory of 1392 408 winupdat.exe 40 PID 408 wrote to memory of 1392 408 winupdat.exe 40 PID 1392 wrote to memory of 1292 1392 winupdat.exe 41 PID 1392 wrote to memory of 1292 1392 winupdat.exe 41 PID 1392 wrote to memory of 1292 1392 winupdat.exe 41 PID 1392 wrote to memory of 1292 1392 winupdat.exe 41 PID 1292 wrote to memory of 892 1292 winupdat.exe 42 PID 1292 wrote to memory of 892 1292 winupdat.exe 42 PID 1292 wrote to memory of 892 1292 winupdat.exe 42 PID 1292 wrote to memory of 892 1292 winupdat.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\winupdat.exeC:\Windows\system32\winupdat.exe 504 "C:\Users\Admin\AppData\Local\Temp\aa387aaa0b91d9e94474aac00e584365_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\winupdat.exeC:\Windows\system32\winupdat.exe 540 "C:\Windows\SysWOW64\winupdat.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\SysWOW64\winupdat.exeC:\Windows\system32\winupdat.exe 536 "C:\Windows\SysWOW64\winupdat.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\winupdat.exeC:\Windows\system32\winupdat.exe 548 "C:\Windows\SysWOW64\winupdat.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\SysWOW64\winupdat.exeC:\Windows\system32\winupdat.exe 532 "C:\Windows\SysWOW64\winupdat.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\winupdat.exeC:\Windows\system32\winupdat.exe 556 "C:\Windows\SysWOW64\winupdat.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\winupdat.exeC:\Windows\system32\winupdat.exe 544 "C:\Windows\SysWOW64\winupdat.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\winupdat.exeC:\Windows\system32\winupdat.exe 564 "C:\Windows\SysWOW64\winupdat.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\SysWOW64\winupdat.exeC:\Windows\system32\winupdat.exe 560 "C:\Windows\SysWOW64\winupdat.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\winupdat.exeC:\Windows\system32\winupdat.exe 528 "C:\Windows\SysWOW64\winupdat.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:892
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
153KB
MD544740f88a09c8be6a556ea97998be1c2
SHA13eb49f612bad1a8bbc3f3d39c09eb404f3c228bf
SHA256c2d7aa4b0c38615aa06d3bff4403f083048f3abf9776de483413de986b869001
SHA512da2ce45b4711d5bd03c93bba31f9426bf0e6b0f300e785e44dfec6584bd6b53225c340ca6568ab97ba5ed4a098d933df486cea93c0dd95e9a5f5aaf72152dc89
-
Filesize
153KB
MD5aa387aaa0b91d9e94474aac00e584365
SHA1459d0ad1a6380154da13f4bcce60da23919a98b2
SHA25612cdebb4fcb3ba8b2a20c02ce2511d313f53c0c22c8cfe04870bb48396f5fdd7
SHA512ab0b20678a81fd19cbf18d364a52df5b60c0428476e0eb19e5ee172702f56a65db4c2d3209e69260e8374c4d5caf2d48020a54d7a2ca40fcc936233ad8b97b21