Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 18:00
Static task
static1
Behavioral task
behavioral1
Sample
b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe
-
Size
153KB
-
MD5
b2ef11a82e287e6f0bf3fe57274adf11
-
SHA1
ed77b9ee297d71fae61ebeb98120dc52c6bdf54b
-
SHA256
dcebf9ef50cb79f0686dacaa02f1a9ed34316f23dcd9630e57b78d91459a1811
-
SHA512
b7fe00919bb55d0d3f370b413091cdbe7d2a7058d3de77887f6c3e499e153374de15d40548acb88f5e76f2bdca85be3a7a8a467d7aed9fb16628bb9e124839a0
-
SSDEEP
3072:DBU5v2uu18Q8d1+2ACISbkBdgYhNsGAcC04usWQQIork8K+zZ6x3Uo9G:+erN8HAZnzgYheufhrk8K+svG
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 20 IoCs
pid Process 2680 MSSCF32.exe 2900 C27D8FEF-D7AE-42c0-82E6-F30598265639.exe 2700 MSSCF32.exe 2544 C27D8FEF-D7AE-42c0-82E6-F30598265639.exe 1648 MSSCF32.exe 2976 C27D8FEF-D7AE-42c0-82E6-F30598265639.exe 2604 MSSCF32.exe 1892 C27D8FEF-D7AE-42c0-82E6-F30598265639.exe 2832 MSSCF32.exe 1604 C27D8FEF-D7AE-42c0-82E6-F30598265639.exe 1576 MSSCF32.exe 2404 C27D8FEF-D7AE-42c0-82E6-F30598265639.exe 1348 MSSCF32.exe 2496 C27D8FEF-D7AE-42c0-82E6-F30598265639.exe 1352 MSSCF32.exe 2320 C27D8FEF-D7AE-42c0-82E6-F30598265639.exe 2620 MSSCF32.exe 1044 C27D8FEF-D7AE-42c0-82E6-F30598265639.exe 2280 MSSCF32.exe 2676 C27D8FEF-D7AE-42c0-82E6-F30598265639.exe -
Loads dropped DLL 40 IoCs
pid Process 2808 b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe 2808 b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe 2808 b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe 2808 b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe 2680 MSSCF32.exe 2680 MSSCF32.exe 2680 MSSCF32.exe 2680 MSSCF32.exe 2700 MSSCF32.exe 2700 MSSCF32.exe 2700 MSSCF32.exe 2700 MSSCF32.exe 1648 MSSCF32.exe 1648 MSSCF32.exe 1648 MSSCF32.exe 1648 MSSCF32.exe 2604 MSSCF32.exe 2604 MSSCF32.exe 2604 MSSCF32.exe 2604 MSSCF32.exe 2832 MSSCF32.exe 2832 MSSCF32.exe 2832 MSSCF32.exe 2832 MSSCF32.exe 1576 MSSCF32.exe 1576 MSSCF32.exe 1576 MSSCF32.exe 1576 MSSCF32.exe 1348 MSSCF32.exe 1348 MSSCF32.exe 1348 MSSCF32.exe 1348 MSSCF32.exe 1352 MSSCF32.exe 1352 MSSCF32.exe 1352 MSSCF32.exe 1352 MSSCF32.exe 2620 MSSCF32.exe 2620 MSSCF32.exe 2620 MSSCF32.exe 2620 MSSCF32.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File created C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File opened for modification C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File created C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File created C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File created C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File created C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File created C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File created C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File created C:\Windows\SysWOW64\MSSCF32.exe b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File opened for modification C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File opened for modification C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File opened for modification C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File opened for modification C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File created C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File opened for modification C:\Windows\SysWOW64\MSSCF32.exe b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe File created C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File opened for modification C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File created C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File opened for modification C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe File opened for modification C:\Windows\SysWOW64\MSSCF32.exe MSSCF32.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSSCF32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSSCF32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSSCF32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSSCF32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSSCF32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSSCF32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSSCF32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSSCF32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSSCF32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MSSCF32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2680 2808 b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2680 2808 b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2680 2808 b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2680 2808 b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe 31 PID 2808 wrote to memory of 2900 2808 b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe 32 PID 2808 wrote to memory of 2900 2808 b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe 32 PID 2808 wrote to memory of 2900 2808 b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe 32 PID 2808 wrote to memory of 2900 2808 b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe 32 PID 2680 wrote to memory of 2700 2680 MSSCF32.exe 33 PID 2680 wrote to memory of 2700 2680 MSSCF32.exe 33 PID 2680 wrote to memory of 2700 2680 MSSCF32.exe 33 PID 2680 wrote to memory of 2700 2680 MSSCF32.exe 33 PID 2680 wrote to memory of 2544 2680 MSSCF32.exe 34 PID 2680 wrote to memory of 2544 2680 MSSCF32.exe 34 PID 2680 wrote to memory of 2544 2680 MSSCF32.exe 34 PID 2680 wrote to memory of 2544 2680 MSSCF32.exe 34 PID 2700 wrote to memory of 1648 2700 MSSCF32.exe 35 PID 2700 wrote to memory of 1648 2700 MSSCF32.exe 35 PID 2700 wrote to memory of 1648 2700 MSSCF32.exe 35 PID 2700 wrote to memory of 1648 2700 MSSCF32.exe 35 PID 2700 wrote to memory of 2976 2700 MSSCF32.exe 36 PID 2700 wrote to memory of 2976 2700 MSSCF32.exe 36 PID 2700 wrote to memory of 2976 2700 MSSCF32.exe 36 PID 2700 wrote to memory of 2976 2700 MSSCF32.exe 36 PID 1648 wrote to memory of 2604 1648 MSSCF32.exe 37 PID 1648 wrote to memory of 2604 1648 MSSCF32.exe 37 PID 1648 wrote to memory of 2604 1648 MSSCF32.exe 37 PID 1648 wrote to memory of 2604 1648 MSSCF32.exe 37 PID 1648 wrote to memory of 1892 1648 MSSCF32.exe 38 PID 1648 wrote to memory of 1892 1648 MSSCF32.exe 38 PID 1648 wrote to memory of 1892 1648 MSSCF32.exe 38 PID 1648 wrote to memory of 1892 1648 MSSCF32.exe 38 PID 2604 wrote to memory of 2832 2604 MSSCF32.exe 39 PID 2604 wrote to memory of 2832 2604 MSSCF32.exe 39 PID 2604 wrote to memory of 2832 2604 MSSCF32.exe 39 PID 2604 wrote to memory of 2832 2604 MSSCF32.exe 39 PID 2604 wrote to memory of 1604 2604 MSSCF32.exe 40 PID 2604 wrote to memory of 1604 2604 MSSCF32.exe 40 PID 2604 wrote to memory of 1604 2604 MSSCF32.exe 40 PID 2604 wrote to memory of 1604 2604 MSSCF32.exe 40 PID 2832 wrote to memory of 1576 2832 MSSCF32.exe 41 PID 2832 wrote to memory of 1576 2832 MSSCF32.exe 41 PID 2832 wrote to memory of 1576 2832 MSSCF32.exe 41 PID 2832 wrote to memory of 1576 2832 MSSCF32.exe 41 PID 2832 wrote to memory of 2404 2832 MSSCF32.exe 42 PID 2832 wrote to memory of 2404 2832 MSSCF32.exe 42 PID 2832 wrote to memory of 2404 2832 MSSCF32.exe 42 PID 2832 wrote to memory of 2404 2832 MSSCF32.exe 42 PID 1576 wrote to memory of 1348 1576 MSSCF32.exe 44 PID 1576 wrote to memory of 1348 1576 MSSCF32.exe 44 PID 1576 wrote to memory of 1348 1576 MSSCF32.exe 44 PID 1576 wrote to memory of 1348 1576 MSSCF32.exe 44 PID 1576 wrote to memory of 2496 1576 MSSCF32.exe 45 PID 1576 wrote to memory of 2496 1576 MSSCF32.exe 45 PID 1576 wrote to memory of 2496 1576 MSSCF32.exe 45 PID 1576 wrote to memory of 2496 1576 MSSCF32.exe 45 PID 1348 wrote to memory of 1352 1348 MSSCF32.exe 46 PID 1348 wrote to memory of 1352 1348 MSSCF32.exe 46 PID 1348 wrote to memory of 1352 1348 MSSCF32.exe 46 PID 1348 wrote to memory of 1352 1348 MSSCF32.exe 46 PID 1348 wrote to memory of 2320 1348 MSSCF32.exe 47 PID 1348 wrote to memory of 2320 1348 MSSCF32.exe 47 PID 1348 wrote to memory of 2320 1348 MSSCF32.exe 47 PID 1348 wrote to memory of 2320 1348 MSSCF32.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\MSSCF32.exeC:\Windows\system32\MSSCF32.exe 456 "C:\Users\Admin\AppData\Local\Temp\b2ef11a82e287e6f0bf3fe57274adf11_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\MSSCF32.exeC:\Windows\system32\MSSCF32.exe 508 "C:\Windows\SysWOW64\MSSCF32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\MSSCF32.exeC:\Windows\system32\MSSCF32.exe 512 "C:\Windows\SysWOW64\MSSCF32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\MSSCF32.exeC:\Windows\system32\MSSCF32.exe 524 "C:\Windows\SysWOW64\MSSCF32.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\MSSCF32.exeC:\Windows\system32\MSSCF32.exe 528 "C:\Windows\SysWOW64\MSSCF32.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\MSSCF32.exeC:\Windows\system32\MSSCF32.exe 536 "C:\Windows\SysWOW64\MSSCF32.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\MSSCF32.exeC:\Windows\system32\MSSCF32.exe 520 "C:\Windows\SysWOW64\MSSCF32.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\MSSCF32.exeC:\Windows\system32\MSSCF32.exe 540 "C:\Windows\SysWOW64\MSSCF32.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1352 -
C:\Windows\SysWOW64\MSSCF32.exeC:\Windows\system32\MSSCF32.exe 516 "C:\Windows\SysWOW64\MSSCF32.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Windows\SysWOW64\MSSCF32.exeC:\Windows\system32\MSSCF32.exe 532 "C:\Windows\SysWOW64\MSSCF32.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2280
-
-
C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"11⤵
- Executes dropped EXE
PID:2676
-
-
-
C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"10⤵
- Executes dropped EXE
PID:1044
-
-
-
C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"9⤵
- Executes dropped EXE
PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"8⤵
- Executes dropped EXE
PID:2496
-
-
-
C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"7⤵
- Executes dropped EXE
PID:2404
-
-
-
C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"6⤵
- Executes dropped EXE
PID:1604
-
-
-
C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"5⤵
- Executes dropped EXE
PID:1892
-
-
-
C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"4⤵
- Executes dropped EXE
PID:2976
-
-
-
C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"3⤵
- Executes dropped EXE
PID:2544
-
-
-
C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"C:\Users\Admin\AppData\Local\Temp\C27D8FEF-D7AE-42c0-82E6-F30598265639.exe"2⤵
- Executes dropped EXE
PID:2900
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD57152446fd31220dd1038b6f7d95ab8a3
SHA1355b3bfae2ff8bf09a040834adae611f85820b02
SHA256ff09e05ee41167c091d35664a44a4af4dd0790fe3f71994a5063f23ca3746a02
SHA512daa5a6f68231bac1a8ac4f6edfac53e85ccd3c4fbc6a1b6c0e9f63f6f7f34f5051e1fe7e4372b1154638b654d7fdc7ed6d6eec26ba967c11224d7f4b525231be
-
Filesize
153KB
MD5b2ef11a82e287e6f0bf3fe57274adf11
SHA1ed77b9ee297d71fae61ebeb98120dc52c6bdf54b
SHA256dcebf9ef50cb79f0686dacaa02f1a9ed34316f23dcd9630e57b78d91459a1811
SHA512b7fe00919bb55d0d3f370b413091cdbe7d2a7058d3de77887f6c3e499e153374de15d40548acb88f5e76f2bdca85be3a7a8a467d7aed9fb16628bb9e124839a0