Analysis
-
max time kernel
142s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe
-
Size
237KB
-
MD5
af159f69da69a1347f4aec364d8d516a
-
SHA1
43cc8809c0b7047dba560bd2ed5a1b5f51413956
-
SHA256
02468c056a80b650117d022bf8cec92e8e5ab1d54bffc2be57c69ba75900939f
-
SHA512
8a619ebea6abd76e7be47eb6f8c1a315f19c5f7f8cf65388493f2069e4bd2d92e8efd477d13a98b577736ee02131e1ad58a8fd23f941a35f95ff259eaa9b3257
-
SSDEEP
6144:Sv2B6BePGPOud+nCHB0zaHy3bN0/Dhyi5laWM03ex:+leed+nC8l35QDUalaWMLx
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 9 IoCs
pid Process 2564 taskmgr2.exe 2836 taskmgr2.exe 1144 taskmgr2.exe 1608 taskmgr2.exe 2944 taskmgr2.exe 2144 taskmgr2.exe 2284 taskmgr2.exe 1336 taskmgr2.exe 3024 taskmgr2.exe -
Loads dropped DLL 18 IoCs
pid Process 2528 af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe 2528 af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe 2564 taskmgr2.exe 2564 taskmgr2.exe 2836 taskmgr2.exe 2836 taskmgr2.exe 1144 taskmgr2.exe 1144 taskmgr2.exe 1608 taskmgr2.exe 1608 taskmgr2.exe 2944 taskmgr2.exe 2944 taskmgr2.exe 2144 taskmgr2.exe 2144 taskmgr2.exe 2284 taskmgr2.exe 2284 taskmgr2.exe 1336 taskmgr2.exe 1336 taskmgr2.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File opened for modification C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File opened for modification C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File opened for modification C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File created C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File created C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File created C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File opened for modification C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File created C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File created C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File created C:\Windows\SysWOW64\taskmgr2.exe af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\taskmgr2.exe af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File created C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File opened for modification C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File created C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File opened for modification C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File created C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File opened for modification C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe File created C:\Windows\SysWOW64\taskmgr2.exe taskmgr2.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr2.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2564 2528 af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe 31 PID 2528 wrote to memory of 2564 2528 af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe 31 PID 2528 wrote to memory of 2564 2528 af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe 31 PID 2528 wrote to memory of 2564 2528 af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe 31 PID 2564 wrote to memory of 2836 2564 taskmgr2.exe 32 PID 2564 wrote to memory of 2836 2564 taskmgr2.exe 32 PID 2564 wrote to memory of 2836 2564 taskmgr2.exe 32 PID 2564 wrote to memory of 2836 2564 taskmgr2.exe 32 PID 2836 wrote to memory of 1144 2836 taskmgr2.exe 33 PID 2836 wrote to memory of 1144 2836 taskmgr2.exe 33 PID 2836 wrote to memory of 1144 2836 taskmgr2.exe 33 PID 2836 wrote to memory of 1144 2836 taskmgr2.exe 33 PID 1144 wrote to memory of 1608 1144 taskmgr2.exe 34 PID 1144 wrote to memory of 1608 1144 taskmgr2.exe 34 PID 1144 wrote to memory of 1608 1144 taskmgr2.exe 34 PID 1144 wrote to memory of 1608 1144 taskmgr2.exe 34 PID 1608 wrote to memory of 2944 1608 taskmgr2.exe 35 PID 1608 wrote to memory of 2944 1608 taskmgr2.exe 35 PID 1608 wrote to memory of 2944 1608 taskmgr2.exe 35 PID 1608 wrote to memory of 2944 1608 taskmgr2.exe 35 PID 2944 wrote to memory of 2144 2944 taskmgr2.exe 37 PID 2944 wrote to memory of 2144 2944 taskmgr2.exe 37 PID 2944 wrote to memory of 2144 2944 taskmgr2.exe 37 PID 2944 wrote to memory of 2144 2944 taskmgr2.exe 37 PID 2144 wrote to memory of 2284 2144 taskmgr2.exe 38 PID 2144 wrote to memory of 2284 2144 taskmgr2.exe 38 PID 2144 wrote to memory of 2284 2144 taskmgr2.exe 38 PID 2144 wrote to memory of 2284 2144 taskmgr2.exe 38 PID 2284 wrote to memory of 1336 2284 taskmgr2.exe 39 PID 2284 wrote to memory of 1336 2284 taskmgr2.exe 39 PID 2284 wrote to memory of 1336 2284 taskmgr2.exe 39 PID 2284 wrote to memory of 1336 2284 taskmgr2.exe 39 PID 1336 wrote to memory of 3024 1336 taskmgr2.exe 40 PID 1336 wrote to memory of 3024 1336 taskmgr2.exe 40 PID 1336 wrote to memory of 3024 1336 taskmgr2.exe 40 PID 1336 wrote to memory of 3024 1336 taskmgr2.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\taskmgr2.exeC:\Windows\system32\taskmgr2.exe 568 "C:\Users\Admin\AppData\Local\Temp\af159f69da69a1347f4aec364d8d516a_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\taskmgr2.exeC:\Windows\system32\taskmgr2.exe 616 "C:\Windows\SysWOW64\taskmgr2.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\taskmgr2.exeC:\Windows\system32\taskmgr2.exe 628 "C:\Windows\SysWOW64\taskmgr2.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\taskmgr2.exeC:\Windows\system32\taskmgr2.exe 612 "C:\Windows\SysWOW64\taskmgr2.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\taskmgr2.exeC:\Windows\system32\taskmgr2.exe 624 "C:\Windows\SysWOW64\taskmgr2.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\taskmgr2.exeC:\Windows\system32\taskmgr2.exe 632 "C:\Windows\SysWOW64\taskmgr2.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\SysWOW64\taskmgr2.exeC:\Windows\system32\taskmgr2.exe 640 "C:\Windows\SysWOW64\taskmgr2.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\taskmgr2.exeC:\Windows\system32\taskmgr2.exe 636 "C:\Windows\SysWOW64\taskmgr2.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\SysWOW64\taskmgr2.exeC:\Windows\system32\taskmgr2.exe 652 "C:\Windows\SysWOW64\taskmgr2.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3024
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD5af159f69da69a1347f4aec364d8d516a
SHA143cc8809c0b7047dba560bd2ed5a1b5f51413956
SHA25602468c056a80b650117d022bf8cec92e8e5ab1d54bffc2be57c69ba75900939f
SHA5128a619ebea6abd76e7be47eb6f8c1a315f19c5f7f8cf65388493f2069e4bd2d92e8efd477d13a98b577736ee02131e1ad58a8fd23f941a35f95ff259eaa9b3257