Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
28-11-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe
-
Size
140KB
-
MD5
aadd0d2ba7a0e4ba9dc9ca9d16b3850a
-
SHA1
5b106ca81866f972f44bb715c11abaa0279545f8
-
SHA256
69a57d048bdaf9d250af7a957072967829b945d66b1b4346a02ce723c4798095
-
SHA512
d185d5225342be801847fc37c556ee2952a432418f861f1d1b7c7746e852af2ddb4479e6548b8312176c24fc97e5970a196409de5f5f8226e9e5054af75aa590
-
SSDEEP
3072:5YnksSE64Ai6x1p2OrS4mOoQDgrz6xIuMBXrmqu:57Q6G0phr+ZQDgrW6B7mqu
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 1720 iexsplore.exe 2596 iexsplore.exe 2872 iexsplore.exe 340 iexsplore.exe 1408 iexsplore.exe 2544 iexsplore.exe 2408 iexsplore.exe 664 iexsplore.exe 2056 iexsplore.exe 1616 iexsplore.exe -
Loads dropped DLL 20 IoCs
pid Process 2640 aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe 2640 aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe 1720 iexsplore.exe 1720 iexsplore.exe 2596 iexsplore.exe 2596 iexsplore.exe 2872 iexsplore.exe 2872 iexsplore.exe 340 iexsplore.exe 340 iexsplore.exe 1408 iexsplore.exe 1408 iexsplore.exe 2544 iexsplore.exe 2544 iexsplore.exe 2408 iexsplore.exe 2408 iexsplore.exe 664 iexsplore.exe 664 iexsplore.exe 2056 iexsplore.exe 2056 iexsplore.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe File created C:\windows\SysWOW64\Aquarium-06.scr aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2640 wrote to memory of 1720 2640 aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe 30 PID 2640 wrote to memory of 1720 2640 aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe 30 PID 2640 wrote to memory of 1720 2640 aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe 30 PID 2640 wrote to memory of 1720 2640 aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe 30 PID 1720 wrote to memory of 2596 1720 iexsplore.exe 32 PID 1720 wrote to memory of 2596 1720 iexsplore.exe 32 PID 1720 wrote to memory of 2596 1720 iexsplore.exe 32 PID 1720 wrote to memory of 2596 1720 iexsplore.exe 32 PID 2596 wrote to memory of 2872 2596 iexsplore.exe 35 PID 2596 wrote to memory of 2872 2596 iexsplore.exe 35 PID 2596 wrote to memory of 2872 2596 iexsplore.exe 35 PID 2596 wrote to memory of 2872 2596 iexsplore.exe 35 PID 2872 wrote to memory of 340 2872 iexsplore.exe 36 PID 2872 wrote to memory of 340 2872 iexsplore.exe 36 PID 2872 wrote to memory of 340 2872 iexsplore.exe 36 PID 2872 wrote to memory of 340 2872 iexsplore.exe 36 PID 340 wrote to memory of 1408 340 iexsplore.exe 37 PID 340 wrote to memory of 1408 340 iexsplore.exe 37 PID 340 wrote to memory of 1408 340 iexsplore.exe 37 PID 340 wrote to memory of 1408 340 iexsplore.exe 37 PID 1408 wrote to memory of 2544 1408 iexsplore.exe 38 PID 1408 wrote to memory of 2544 1408 iexsplore.exe 38 PID 1408 wrote to memory of 2544 1408 iexsplore.exe 38 PID 1408 wrote to memory of 2544 1408 iexsplore.exe 38 PID 2544 wrote to memory of 2408 2544 iexsplore.exe 39 PID 2544 wrote to memory of 2408 2544 iexsplore.exe 39 PID 2544 wrote to memory of 2408 2544 iexsplore.exe 39 PID 2544 wrote to memory of 2408 2544 iexsplore.exe 39 PID 2408 wrote to memory of 664 2408 iexsplore.exe 40 PID 2408 wrote to memory of 664 2408 iexsplore.exe 40 PID 2408 wrote to memory of 664 2408 iexsplore.exe 40 PID 2408 wrote to memory of 664 2408 iexsplore.exe 40 PID 664 wrote to memory of 2056 664 iexsplore.exe 41 PID 664 wrote to memory of 2056 664 iexsplore.exe 41 PID 664 wrote to memory of 2056 664 iexsplore.exe 41 PID 664 wrote to memory of 2056 664 iexsplore.exe 41 PID 2056 wrote to memory of 1616 2056 iexsplore.exe 42 PID 2056 wrote to memory of 1616 2056 iexsplore.exe 42 PID 2056 wrote to memory of 1616 2056 iexsplore.exe 42 PID 2056 wrote to memory of 1616 2056 iexsplore.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 488 "C:\Users\Admin\AppData\Local\Temp\aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 536 "C:\Windows\SysWOW64\iexsplore.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 532 "C:\Windows\SysWOW64\iexsplore.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 540 "C:\Windows\SysWOW64\iexsplore.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 544 "C:\Windows\SysWOW64\iexsplore.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 556 "C:\Windows\SysWOW64\iexsplore.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 564 "C:\Windows\SysWOW64\iexsplore.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 548 "C:\Windows\SysWOW64\iexsplore.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 560 "C:\Windows\SysWOW64\iexsplore.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 568 "C:\Windows\SysWOW64\iexsplore.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1616
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD510b57f5d907a1e2f0afa66d0e6d05a5d
SHA1d87e1556593b17c10facada78fe3b3a35c0f7552
SHA256805f89516ae3725e591d02cc0594f250fbc9ab74461f1e03faeed1649f24e9a2
SHA512351c9dc4360aee64d95e42c5b394a28c472e248e86b10538b699c0ce4ea3eceafb917e908b0bc1656ba124ef81ba56de0e78ee3e749fe26987fc1a0fcde57cd4
-
Filesize
140KB
MD5aadd0d2ba7a0e4ba9dc9ca9d16b3850a
SHA15b106ca81866f972f44bb715c11abaa0279545f8
SHA25669a57d048bdaf9d250af7a957072967829b945d66b1b4346a02ce723c4798095
SHA512d185d5225342be801847fc37c556ee2952a432418f861f1d1b7c7746e852af2ddb4479e6548b8312176c24fc97e5970a196409de5f5f8226e9e5054af75aa590