Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 17:13
Behavioral task
behavioral1
Sample
b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe
-
Size
350KB
-
MD5
b2b4f7b154ba5e38fa8b0a3bb346cd2b
-
SHA1
6eb49ad72def6106d3288338cf93cf4c82a19567
-
SHA256
c57f408f688b2aa096be28ccc6bfed020e5ac5faec355b1a09e7b9e463f020ba
-
SHA512
1b30e0b8ea093ccc0b25491b825e63721e6b75edea9ea5fdab2e46bb3cba06b7689a57d2e036bd535dbf9cd4da65106852246906675612c55c7d6855596e12f1
-
SSDEEP
6144:6diDb0qnZl9yEeuBP0VI6zTc6/AuzW7vlxzlpQjH7MHm610BLA:6di30qnf9yEeePczw6/Pq7HzlpQj4+A
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 1524 IEXPLORER.exe 868 IEXPLORER.exe 4372 IEXPLORER.exe 1188 IEXPLORER.exe 2056 IEXPLORER.exe 4356 IEXPLORER.exe 4916 IEXPLORER.exe 3144 IEXPLORER.exe 3692 IEXPLORER.exe 860 IEXPLORER.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\IEXPLORER.exe b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File created C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe File opened for modification C:\Windows\SysWOW64\IEXPLORER.exe IEXPLORER.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORER.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1524 2596 b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe 83 PID 2596 wrote to memory of 1524 2596 b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe 83 PID 2596 wrote to memory of 1524 2596 b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe 83 PID 1524 wrote to memory of 868 1524 IEXPLORER.exe 97 PID 1524 wrote to memory of 868 1524 IEXPLORER.exe 97 PID 1524 wrote to memory of 868 1524 IEXPLORER.exe 97 PID 868 wrote to memory of 4372 868 IEXPLORER.exe 100 PID 868 wrote to memory of 4372 868 IEXPLORER.exe 100 PID 868 wrote to memory of 4372 868 IEXPLORER.exe 100 PID 4372 wrote to memory of 1188 4372 IEXPLORER.exe 102 PID 4372 wrote to memory of 1188 4372 IEXPLORER.exe 102 PID 4372 wrote to memory of 1188 4372 IEXPLORER.exe 102 PID 1188 wrote to memory of 2056 1188 IEXPLORER.exe 103 PID 1188 wrote to memory of 2056 1188 IEXPLORER.exe 103 PID 1188 wrote to memory of 2056 1188 IEXPLORER.exe 103 PID 2056 wrote to memory of 4356 2056 IEXPLORER.exe 105 PID 2056 wrote to memory of 4356 2056 IEXPLORER.exe 105 PID 2056 wrote to memory of 4356 2056 IEXPLORER.exe 105 PID 4356 wrote to memory of 4916 4356 IEXPLORER.exe 106 PID 4356 wrote to memory of 4916 4356 IEXPLORER.exe 106 PID 4356 wrote to memory of 4916 4356 IEXPLORER.exe 106 PID 4916 wrote to memory of 3144 4916 IEXPLORER.exe 107 PID 4916 wrote to memory of 3144 4916 IEXPLORER.exe 107 PID 4916 wrote to memory of 3144 4916 IEXPLORER.exe 107 PID 3144 wrote to memory of 3692 3144 IEXPLORER.exe 108 PID 3144 wrote to memory of 3692 3144 IEXPLORER.exe 108 PID 3144 wrote to memory of 3692 3144 IEXPLORER.exe 108 PID 3692 wrote to memory of 860 3692 IEXPLORER.exe 109 PID 3692 wrote to memory of 860 3692 IEXPLORER.exe 109 PID 3692 wrote to memory of 860 3692 IEXPLORER.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 1032 "C:\Users\Admin\AppData\Local\Temp\b2b4f7b154ba5e38fa8b0a3bb346cd2b_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 1156 "C:\Windows\SysWOW64\IEXPLORER.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 1128 "C:\Windows\SysWOW64\IEXPLORER.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 1132 "C:\Windows\SysWOW64\IEXPLORER.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 1124 "C:\Windows\SysWOW64\IEXPLORER.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 1136 "C:\Windows\SysWOW64\IEXPLORER.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 1116 "C:\Windows\SysWOW64\IEXPLORER.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 1096 "C:\Windows\SysWOW64\IEXPLORER.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3144 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 1148 "C:\Windows\SysWOW64\IEXPLORER.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\IEXPLORER.exeC:\Windows\system32\IEXPLORER.exe 1160 "C:\Windows\SysWOW64\IEXPLORER.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:860
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350KB
MD5b2b4f7b154ba5e38fa8b0a3bb346cd2b
SHA16eb49ad72def6106d3288338cf93cf4c82a19567
SHA256c57f408f688b2aa096be28ccc6bfed020e5ac5faec355b1a09e7b9e463f020ba
SHA5121b30e0b8ea093ccc0b25491b825e63721e6b75edea9ea5fdab2e46bb3cba06b7689a57d2e036bd535dbf9cd4da65106852246906675612c55c7d6855596e12f1