Analysis
-
max time kernel
137s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 17:13
Behavioral task
behavioral1
Sample
b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe
-
Size
350KB
-
MD5
b2b4f7b154ba5e38fa8b0a3bb346cd2b
-
SHA1
6eb49ad72def6106d3288338cf93cf4c82a19567
-
SHA256
c57f408f688b2aa096be28ccc6bfed020e5ac5faec355b1a09e7b9e463f020ba
-
SHA512
1b30e0b8ea093ccc0b25491b825e63721e6b75edea9ea5fdab2e46bb3cba06b7689a57d2e036bd535dbf9cd4da65106852246906675612c55c7d6855596e12f1
-
SSDEEP
6144:6diDb0qnZl9yEeuBP0VI6zTc6/AuzW7vlxzlpQjH7MHm610BLA:6di30qnf9yEeePczw6/Pq7HzlpQj4+A
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 2360 IEXPLORER.exe 2788 IEXPLORER.exe 1856 IEXPLORER.exe 2692 IEXPLORER.exe 1592 IEXPLORER.exe 2300 IEXPLORER.exe 1652 IEXPLORER.exe 2972 IEXPLORER.exe 2092 IEXPLORER.exe 1892 IEXPLORER.exe -
Loads dropped DLL 20 IoCs
pid Process 1704 b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe 1704 b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe 2360 IEXPLORER.exe 2360 IEXPLORER.exe 2788 IEXPLORER.exe 2788 IEXPLORER.exe 1856 IEXPLORER.exe 1856 IEXPLORER.exe 2692 IEXPLORER.exe 2692 IEXPLORER.exe 1592 IEXPLORER.exe 1592 IEXPLORER.exe 2300 IEXPLORER.exe 2300 IEXPLORER.exe 1652 IEXPLORER.exe 1652 IEXPLORER.exe 2972 IEXPLORER.exe 2972 IEXPLORER.exe 2092 IEXPLORER.exe 2092 IEXPLORER.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1704 wrote to memory of 2360 1704 b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe 31 PID 1704 wrote to memory of 2360 1704 b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe 31 PID 1704 wrote to memory of 2360 1704 b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe 31 PID 1704 wrote to memory of 2360 1704 b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2788 2360 IEXPLORER.exe 32 PID 2360 wrote to memory of 2788 2360 IEXPLORER.exe 32 PID 2360 wrote to memory of 2788 2360 IEXPLORER.exe 32 PID 2360 wrote to memory of 2788 2360 IEXPLORER.exe 32 PID 2788 wrote to memory of 1856 2788 IEXPLORER.exe 33 PID 2788 wrote to memory of 1856 2788 IEXPLORER.exe 33 PID 2788 wrote to memory of 1856 2788 IEXPLORER.exe 33 PID 2788 wrote to memory of 1856 2788 IEXPLORER.exe 33 PID 1856 wrote to memory of 2692 1856 IEXPLORER.exe 34 PID 1856 wrote to memory of 2692 1856 IEXPLORER.exe 34 PID 1856 wrote to memory of 2692 1856 IEXPLORER.exe 34 PID 1856 wrote to memory of 2692 1856 IEXPLORER.exe 34 PID 2692 wrote to memory of 1592 2692 IEXPLORER.exe 35 PID 2692 wrote to memory of 1592 2692 IEXPLORER.exe 35 PID 2692 wrote to memory of 1592 2692 IEXPLORER.exe 35 PID 2692 wrote to memory of 1592 2692 IEXPLORER.exe 35 PID 1592 wrote to memory of 2300 1592 IEXPLORER.exe 36 PID 1592 wrote to memory of 2300 1592 IEXPLORER.exe 36 PID 1592 wrote to memory of 2300 1592 IEXPLORER.exe 36 PID 1592 wrote to memory of 2300 1592 IEXPLORER.exe 36 PID 2300 wrote to memory of 1652 2300 IEXPLORER.exe 38 PID 2300 wrote to memory of 1652 2300 IEXPLORER.exe 38 PID 2300 wrote to memory of 1652 2300 IEXPLORER.exe 38 PID 2300 wrote to memory of 1652 2300 IEXPLORER.exe 38 PID 1652 wrote to memory of 2972 1652 IEXPLORER.exe 39 PID 1652 wrote to memory of 2972 1652 IEXPLORER.exe 39 PID 1652 wrote to memory of 2972 1652 IEXPLORER.exe 39 PID 1652 wrote to memory of 2972 1652 IEXPLORER.exe 39 PID 2972 wrote to memory of 2092 2972 IEXPLORER.exe 40 PID 2972 wrote to memory of 2092 2972 IEXPLORER.exe 40 PID 2972 wrote to memory of 2092 2972 IEXPLORER.exe 40 PID 2972 wrote to memory of 2092 2972 IEXPLORER.exe 40 PID 2092 wrote to memory of 1892 2092 IEXPLORER.exe 41 PID 2092 wrote to memory of 1892 2092 IEXPLORER.exe 41 PID 2092 wrote to memory of 1892 2092 IEXPLORER.exe 41 PID 2092 wrote to memory of 1892 2092 IEXPLORER.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 496 "C:\Users\Admin\AppData\Local\Temp\b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 528 "C:\Windows\SysWOW64\IEXPLORER.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 536 "C:\Windows\SysWOW64\IEXPLORER.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 532 "C:\Windows\SysWOW64\IEXPLORER.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 548 "C:\Windows\SysWOW64\IEXPLORER.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 544 "C:\Windows\SysWOW64\IEXPLORER.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 556 "C:\Windows\SysWOW64\IEXPLORER.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 552 "C:\Windows\SysWOW64\IEXPLORER.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 540 "C:\Windows\SysWOW64\IEXPLORER.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 560 "C:\Windows\SysWOW64\IEXPLORER.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1892
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350KB
MD5b2b4f7b154ba5e38fa8b0a3bb346cd2b
SHA16eb49ad72def6106d3288338cf93cf4c82a19567
SHA256c57f408f688b2aa096be28ccc6bfed020e5ac5faec355b1a09e7b9e463f020ba
SHA5121b30e0b8ea093ccc0b25491b825e63721e6b75edea9ea5fdab2e46bb3cba06b7689a57d2e036bd535dbf9cd4da65106852246906675612c55c7d6855596e12f1