Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 20:12
Static task
static1
Behavioral task
behavioral1
Sample
b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe
-
Size
496KB
-
MD5
b352690c5cabe0b0d2bb4300a2e8d78b
-
SHA1
c5e3f94b8e4335d4c8d062efad6c215e7cdc6616
-
SHA256
12328c3a65d746a4205c2b27f7e884212c2c7c515eb127788b371ea96e000372
-
SHA512
103775f213655b829019282d97d901e5fe78e81eab7fc521486dcc7244d6ce9fdb0d82e0108d5854d496421c331e3570fc205837da7a3f98e4cdfd45c0156bdf
-
SSDEEP
12288:deUDKuE/KOFuxc0bWN+NOO3MqHpiCIbflrMUs:de1LhsNbWN+TMqJADFMv
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 20 IoCs
pid Process 3164 taskmrg.exe 3944 taskmrg.exe 408 taskmrg.exe 468 taskmrg.exe 2308 taskmrg.exe 1736 taskmrg.exe 1908 taskmrg.exe 2164 taskmrg.exe 1480 taskmrg.exe 1444 taskmrg.exe 3684 taskmrg.exe 3768 taskmrg.exe 3384 taskmrg.exe 3940 taskmrg.exe 2084 taskmrg.exe 4800 taskmrg.exe 1708 taskmrg.exe 4000 taskmrg.exe 4488 taskmrg.exe 4948 taskmrg.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 3672 set thread context of 3916 3672 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 82 PID 3164 set thread context of 3944 3164 taskmrg.exe 84 PID 408 set thread context of 468 408 taskmrg.exe 91 PID 2308 set thread context of 1736 2308 taskmrg.exe 96 PID 1908 set thread context of 2164 1908 taskmrg.exe 99 PID 1480 set thread context of 1444 1480 taskmrg.exe 101 PID 3684 set thread context of 3768 3684 taskmrg.exe 103 PID 3384 set thread context of 3940 3384 taskmrg.exe 105 PID 2084 set thread context of 4800 2084 taskmrg.exe 107 PID 1708 set thread context of 4000 1708 taskmrg.exe 109 PID 4488 set thread context of 4948 4488 taskmrg.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3672 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 3164 taskmrg.exe 408 taskmrg.exe 2308 taskmrg.exe 1908 taskmrg.exe 1480 taskmrg.exe 3684 taskmrg.exe 3384 taskmrg.exe 2084 taskmrg.exe 1708 taskmrg.exe 4488 taskmrg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3672 wrote to memory of 3916 3672 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 82 PID 3672 wrote to memory of 3916 3672 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 82 PID 3672 wrote to memory of 3916 3672 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 82 PID 3672 wrote to memory of 3916 3672 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 82 PID 3672 wrote to memory of 3916 3672 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 82 PID 3672 wrote to memory of 3916 3672 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 82 PID 3672 wrote to memory of 3916 3672 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 82 PID 3672 wrote to memory of 3916 3672 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 82 PID 3672 wrote to memory of 3916 3672 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 82 PID 3672 wrote to memory of 3916 3672 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 82 PID 3672 wrote to memory of 3916 3672 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 82 PID 3916 wrote to memory of 3164 3916 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 83 PID 3916 wrote to memory of 3164 3916 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 83 PID 3916 wrote to memory of 3164 3916 b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe 83 PID 3164 wrote to memory of 3944 3164 taskmrg.exe 84 PID 3164 wrote to memory of 3944 3164 taskmrg.exe 84 PID 3164 wrote to memory of 3944 3164 taskmrg.exe 84 PID 3164 wrote to memory of 3944 3164 taskmrg.exe 84 PID 3164 wrote to memory of 3944 3164 taskmrg.exe 84 PID 3164 wrote to memory of 3944 3164 taskmrg.exe 84 PID 3164 wrote to memory of 3944 3164 taskmrg.exe 84 PID 3164 wrote to memory of 3944 3164 taskmrg.exe 84 PID 3164 wrote to memory of 3944 3164 taskmrg.exe 84 PID 3164 wrote to memory of 3944 3164 taskmrg.exe 84 PID 3164 wrote to memory of 3944 3164 taskmrg.exe 84 PID 3944 wrote to memory of 408 3944 taskmrg.exe 90 PID 3944 wrote to memory of 408 3944 taskmrg.exe 90 PID 3944 wrote to memory of 408 3944 taskmrg.exe 90 PID 408 wrote to memory of 468 408 taskmrg.exe 91 PID 408 wrote to memory of 468 408 taskmrg.exe 91 PID 408 wrote to memory of 468 408 taskmrg.exe 91 PID 408 wrote to memory of 468 408 taskmrg.exe 91 PID 408 wrote to memory of 468 408 taskmrg.exe 91 PID 408 wrote to memory of 468 408 taskmrg.exe 91 PID 408 wrote to memory of 468 408 taskmrg.exe 91 PID 408 wrote to memory of 468 408 taskmrg.exe 91 PID 408 wrote to memory of 468 408 taskmrg.exe 91 PID 408 wrote to memory of 468 408 taskmrg.exe 91 PID 408 wrote to memory of 468 408 taskmrg.exe 91 PID 468 wrote to memory of 2308 468 taskmrg.exe 95 PID 468 wrote to memory of 2308 468 taskmrg.exe 95 PID 468 wrote to memory of 2308 468 taskmrg.exe 95 PID 2308 wrote to memory of 1736 2308 taskmrg.exe 96 PID 2308 wrote to memory of 1736 2308 taskmrg.exe 96 PID 2308 wrote to memory of 1736 2308 taskmrg.exe 96 PID 2308 wrote to memory of 1736 2308 taskmrg.exe 96 PID 2308 wrote to memory of 1736 2308 taskmrg.exe 96 PID 2308 wrote to memory of 1736 2308 taskmrg.exe 96 PID 2308 wrote to memory of 1736 2308 taskmrg.exe 96 PID 2308 wrote to memory of 1736 2308 taskmrg.exe 96 PID 2308 wrote to memory of 1736 2308 taskmrg.exe 96 PID 2308 wrote to memory of 1736 2308 taskmrg.exe 96 PID 2308 wrote to memory of 1736 2308 taskmrg.exe 96 PID 1736 wrote to memory of 1908 1736 taskmrg.exe 98 PID 1736 wrote to memory of 1908 1736 taskmrg.exe 98 PID 1736 wrote to memory of 1908 1736 taskmrg.exe 98 PID 1908 wrote to memory of 2164 1908 taskmrg.exe 99 PID 1908 wrote to memory of 2164 1908 taskmrg.exe 99 PID 1908 wrote to memory of 2164 1908 taskmrg.exe 99 PID 1908 wrote to memory of 2164 1908 taskmrg.exe 99 PID 1908 wrote to memory of 2164 1908 taskmrg.exe 99 PID 1908 wrote to memory of 2164 1908 taskmrg.exe 99 PID 1908 wrote to memory of 2164 1908 taskmrg.exe 99 PID 1908 wrote to memory of 2164 1908 taskmrg.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1004 "C:\Users\Admin\AppData\Local\Temp\b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\taskmrg.exe1004 "C:\Users\Admin\AppData\Local\Temp\b352690c5cabe0b0d2bb4300a2e8d78b_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1120 "C:\Windows\SysWOW64\taskmrg.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\taskmrg.exe1120 "C:\Windows\SysWOW64\taskmrg.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1120 "C:\Windows\SysWOW64\taskmrg.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\taskmrg.exe1120 "C:\Windows\SysWOW64\taskmrg.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1120 "C:\Windows\SysWOW64\taskmrg.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\taskmrg.exe1120 "C:\Windows\SysWOW64\taskmrg.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1124 "C:\Windows\SysWOW64\taskmrg.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Windows\SysWOW64\taskmrg.exe1124 "C:\Windows\SysWOW64\taskmrg.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1124 "C:\Windows\SysWOW64\taskmrg.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3684 -
C:\Windows\SysWOW64\taskmrg.exe1124 "C:\Windows\SysWOW64\taskmrg.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3768 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1124 "C:\Windows\SysWOW64\taskmrg.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3384 -
C:\Windows\SysWOW64\taskmrg.exe1124 "C:\Windows\SysWOW64\taskmrg.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1112 "C:\Windows\SysWOW64\taskmrg.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Windows\SysWOW64\taskmrg.exe1112 "C:\Windows\SysWOW64\taskmrg.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4800 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1120 "C:\Windows\SysWOW64\taskmrg.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Windows\SysWOW64\taskmrg.exe1120 "C:\Windows\SysWOW64\taskmrg.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4000 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1120 "C:\Windows\SysWOW64\taskmrg.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4488 -
C:\Windows\SysWOW64\taskmrg.exe1120 "C:\Windows\SysWOW64\taskmrg.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4948
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3442511616-637977696-3186306149-1000\699c4b9cdebca7aaea5193cae8a50098_5ab270f5-f3a9-47d1-97d7-bbd50acf9955
Filesize50B
MD55b63d4dd8c04c88c0e30e494ec6a609a
SHA1884d5a8bdc25fe794dc22ef9518009dcf0069d09
SHA2564d93c22555b3169e5c13716ca59b8b22892c69b3025aea841afe5259698102fd
SHA51215ff8551ac6b9de978050569bcdc26f44dfc06a0eaf445ac70fd45453a21bdafa3e4c8b4857d6a1c3226f4102a639682bdfb71d7b255062fb81a51c9126896cb
-
Filesize
496KB
MD5b352690c5cabe0b0d2bb4300a2e8d78b
SHA1c5e3f94b8e4335d4c8d062efad6c215e7cdc6616
SHA25612328c3a65d746a4205c2b27f7e884212c2c7c515eb127788b371ea96e000372
SHA512103775f213655b829019282d97d901e5fe78e81eab7fc521486dcc7244d6ce9fdb0d82e0108d5854d496421c331e3570fc205837da7a3f98e4cdfd45c0156bdf