Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe
-
Size
140KB
-
MD5
aadd0d2ba7a0e4ba9dc9ca9d16b3850a
-
SHA1
5b106ca81866f972f44bb715c11abaa0279545f8
-
SHA256
69a57d048bdaf9d250af7a957072967829b945d66b1b4346a02ce723c4798095
-
SHA512
d185d5225342be801847fc37c556ee2952a432418f861f1d1b7c7746e852af2ddb4479e6548b8312176c24fc97e5970a196409de5f5f8226e9e5054af75aa590
-
SSDEEP
3072:5YnksSE64Ai6x1p2OrS4mOoQDgrz6xIuMBXrmqu:57Q6G0phr+ZQDgrW6B7mqu
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 3504 iexsplore.exe 2532 iexsplore.exe 3380 iexsplore.exe 3576 iexsplore.exe 1696 iexsplore.exe 2636 iexsplore.exe 1412 iexsplore.exe 3652 iexsplore.exe 5116 iexsplore.exe 2676 iexsplore.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File created C:\windows\SysWOW64\Aquarium-06.scr aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe File created C:\Windows\SysWOW64\iexsplore.exe iexsplore.exe File opened for modification C:\windows\SysWOW64\Aquarium-06.scr iexsplore.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexsplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 1496 wrote to memory of 3504 1496 aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe 83 PID 1496 wrote to memory of 3504 1496 aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe 83 PID 1496 wrote to memory of 3504 1496 aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe 83 PID 3504 wrote to memory of 2532 3504 iexsplore.exe 98 PID 3504 wrote to memory of 2532 3504 iexsplore.exe 98 PID 3504 wrote to memory of 2532 3504 iexsplore.exe 98 PID 2532 wrote to memory of 3380 2532 iexsplore.exe 102 PID 2532 wrote to memory of 3380 2532 iexsplore.exe 102 PID 2532 wrote to memory of 3380 2532 iexsplore.exe 102 PID 3380 wrote to memory of 3576 3380 iexsplore.exe 105 PID 3380 wrote to memory of 3576 3380 iexsplore.exe 105 PID 3380 wrote to memory of 3576 3380 iexsplore.exe 105 PID 3576 wrote to memory of 1696 3576 iexsplore.exe 107 PID 3576 wrote to memory of 1696 3576 iexsplore.exe 107 PID 3576 wrote to memory of 1696 3576 iexsplore.exe 107 PID 1696 wrote to memory of 2636 1696 iexsplore.exe 110 PID 1696 wrote to memory of 2636 1696 iexsplore.exe 110 PID 1696 wrote to memory of 2636 1696 iexsplore.exe 110 PID 2636 wrote to memory of 1412 2636 iexsplore.exe 112 PID 2636 wrote to memory of 1412 2636 iexsplore.exe 112 PID 2636 wrote to memory of 1412 2636 iexsplore.exe 112 PID 1412 wrote to memory of 3652 1412 iexsplore.exe 114 PID 1412 wrote to memory of 3652 1412 iexsplore.exe 114 PID 1412 wrote to memory of 3652 1412 iexsplore.exe 114 PID 3652 wrote to memory of 5116 3652 iexsplore.exe 116 PID 3652 wrote to memory of 5116 3652 iexsplore.exe 116 PID 3652 wrote to memory of 5116 3652 iexsplore.exe 116 PID 5116 wrote to memory of 2676 5116 iexsplore.exe 118 PID 5116 wrote to memory of 2676 5116 iexsplore.exe 118 PID 5116 wrote to memory of 2676 5116 iexsplore.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 1140 "C:\Users\Admin\AppData\Local\Temp\aadd0d2ba7a0e4ba9dc9ca9d16b3850a_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 1152 "C:\Windows\SysWOW64\iexsplore.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 1120 "C:\Windows\SysWOW64\iexsplore.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 1124 "C:\Windows\SysWOW64\iexsplore.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 1128 "C:\Windows\SysWOW64\iexsplore.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 1132 "C:\Windows\SysWOW64\iexsplore.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 1136 "C:\Windows\SysWOW64\iexsplore.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 1144 "C:\Windows\SysWOW64\iexsplore.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 1148 "C:\Windows\SysWOW64\iexsplore.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\SysWOW64\iexsplore.exeC:\Windows\system32\iexsplore.exe 1156 "C:\Windows\SysWOW64\iexsplore.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2676
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
140KB
MD5aadd0d2ba7a0e4ba9dc9ca9d16b3850a
SHA15b106ca81866f972f44bb715c11abaa0279545f8
SHA25669a57d048bdaf9d250af7a957072967829b945d66b1b4346a02ce723c4798095
SHA512d185d5225342be801847fc37c556ee2952a432418f861f1d1b7c7746e852af2ddb4479e6548b8312176c24fc97e5970a196409de5f5f8226e9e5054af75aa590
-
Filesize
140KB
MD5bca53440d76e6f8857dd0e0eb0270a06
SHA158a4291083057b1152141359c06b7a877272d334
SHA25678479e9fbb6744a437b066c7e4ee1fd39c936379a7eee88bc8150d230c3b065c
SHA512663d6383e61af9b9f69cf1d99c8b0ab81bfac9c544bb112067981ba18ab24fa3b9ef543e338891163f0cb61561591b961f1dc1ac7234af6ecaa97792b6e68789