Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 00:47
Static task
static1
Behavioral task
behavioral1
Sample
b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe
-
Size
116KB
-
MD5
b4410ebd1a7f254bc88f4d6a16047c30
-
SHA1
3ee004a087607a0b582870b431093ebc344725b1
-
SHA256
db184bed6c94d4ec5ba45c3c3071a1a8882a7cd68210619cf8b829dfe409e7ee
-
SHA512
d8354593a4a47a177906113427432edd9606dd095d44afec82a8fdd4e3178a5ec135dfc259d6041054d36b37c42446fdf49f8110776051154da507078f494b5f
-
SSDEEP
3072:EZpqQJAO4yQ+Wt7iPNPvAKOhk9JzetrRqXyOnkIY+I5E:QpqQGcWlilDqtFqXNnkRx5
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 2848 wintask32.exe 2572 wintask32.exe 572 wintask32.exe 2500 wintask32.exe 1156 wintask32.exe 2300 wintask32.exe 2032 wintask32.exe 2488 wintask32.exe 2256 wintask32.exe 2044 wintask32.exe -
Loads dropped DLL 20 IoCs
pid Process 2768 b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe 2768 b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe 2848 wintask32.exe 2848 wintask32.exe 2572 wintask32.exe 2572 wintask32.exe 572 wintask32.exe 572 wintask32.exe 2500 wintask32.exe 2500 wintask32.exe 1156 wintask32.exe 1156 wintask32.exe 2300 wintask32.exe 2300 wintask32.exe 2032 wintask32.exe 2032 wintask32.exe 2488 wintask32.exe 2488 wintask32.exe 2256 wintask32.exe 2256 wintask32.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\wintask32.exe wintask32.exe File opened for modification C:\Windows\SysWOW64\wintask32.exe b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wintask32.exe wintask32.exe File created C:\Windows\SysWOW64\wintask32.exe wintask32.exe File created C:\Windows\SysWOW64\wintask32.exe wintask32.exe File opened for modification C:\Windows\SysWOW64\wintask32.exe wintask32.exe File created C:\Windows\SysWOW64\wintask32.exe wintask32.exe File opened for modification C:\Windows\SysWOW64\wintask32.exe wintask32.exe File created C:\Windows\SysWOW64\wintask32.exe wintask32.exe File created C:\Windows\SysWOW64\wintask32.exe wintask32.exe File created C:\Windows\SysWOW64\wintask32.exe wintask32.exe File created C:\Windows\SysWOW64\wintask32.exe wintask32.exe File opened for modification C:\Windows\SysWOW64\wintask32.exe wintask32.exe File opened for modification C:\Windows\SysWOW64\wintask32.exe wintask32.exe File opened for modification C:\Windows\SysWOW64\wintask32.exe wintask32.exe File created C:\Windows\SysWOW64\wintask32.exe wintask32.exe File opened for modification C:\Windows\SysWOW64\wintask32.exe wintask32.exe File opened for modification C:\Windows\SysWOW64\wintask32.exe wintask32.exe File created C:\Windows\SysWOW64\wintask32.exe wintask32.exe File opened for modification C:\Windows\SysWOW64\wintask32.exe wintask32.exe File created C:\Windows\SysWOW64\wintask32.exe b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wintask32.exe wintask32.exe -
Drops file in Windows directory 10 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64 wintask32.exe File opened for modification C:\Windows\SysWOW64 wintask32.exe File opened for modification C:\Windows\SysWOW64 b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64 wintask32.exe File opened for modification C:\Windows\SysWOW64 wintask32.exe File opened for modification C:\Windows\SysWOW64 wintask32.exe File opened for modification C:\Windows\SysWOW64 wintask32.exe File opened for modification C:\Windows\SysWOW64 wintask32.exe File opened for modification C:\Windows\SysWOW64 wintask32.exe File opened for modification C:\Windows\SysWOW64 wintask32.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintask32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintask32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintask32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintask32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintask32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintask32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintask32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintask32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintask32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintask32.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2768 wrote to memory of 2848 2768 b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2848 2768 b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2848 2768 b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe 30 PID 2768 wrote to memory of 2848 2768 b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe 30 PID 2848 wrote to memory of 2572 2848 wintask32.exe 31 PID 2848 wrote to memory of 2572 2848 wintask32.exe 31 PID 2848 wrote to memory of 2572 2848 wintask32.exe 31 PID 2848 wrote to memory of 2572 2848 wintask32.exe 31 PID 2572 wrote to memory of 572 2572 wintask32.exe 33 PID 2572 wrote to memory of 572 2572 wintask32.exe 33 PID 2572 wrote to memory of 572 2572 wintask32.exe 33 PID 2572 wrote to memory of 572 2572 wintask32.exe 33 PID 572 wrote to memory of 2500 572 wintask32.exe 34 PID 572 wrote to memory of 2500 572 wintask32.exe 34 PID 572 wrote to memory of 2500 572 wintask32.exe 34 PID 572 wrote to memory of 2500 572 wintask32.exe 34 PID 2500 wrote to memory of 1156 2500 wintask32.exe 35 PID 2500 wrote to memory of 1156 2500 wintask32.exe 35 PID 2500 wrote to memory of 1156 2500 wintask32.exe 35 PID 2500 wrote to memory of 1156 2500 wintask32.exe 35 PID 1156 wrote to memory of 2300 1156 wintask32.exe 36 PID 1156 wrote to memory of 2300 1156 wintask32.exe 36 PID 1156 wrote to memory of 2300 1156 wintask32.exe 36 PID 1156 wrote to memory of 2300 1156 wintask32.exe 36 PID 2300 wrote to memory of 2032 2300 wintask32.exe 37 PID 2300 wrote to memory of 2032 2300 wintask32.exe 37 PID 2300 wrote to memory of 2032 2300 wintask32.exe 37 PID 2300 wrote to memory of 2032 2300 wintask32.exe 37 PID 2032 wrote to memory of 2488 2032 wintask32.exe 38 PID 2032 wrote to memory of 2488 2032 wintask32.exe 38 PID 2032 wrote to memory of 2488 2032 wintask32.exe 38 PID 2032 wrote to memory of 2488 2032 wintask32.exe 38 PID 2488 wrote to memory of 2256 2488 wintask32.exe 39 PID 2488 wrote to memory of 2256 2488 wintask32.exe 39 PID 2488 wrote to memory of 2256 2488 wintask32.exe 39 PID 2488 wrote to memory of 2256 2488 wintask32.exe 39 PID 2256 wrote to memory of 2044 2256 wintask32.exe 40 PID 2256 wrote to memory of 2044 2256 wintask32.exe 40 PID 2256 wrote to memory of 2044 2256 wintask32.exe 40 PID 2256 wrote to memory of 2044 2256 wintask32.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\wintask32.exeC:\Windows\system32\wintask32.exe 472 "C:\Users\Admin\AppData\Local\Temp\b4410ebd1a7f254bc88f4d6a16047c30_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\wintask32.exeC:\Windows\system32\wintask32.exe 516 "C:\Windows\SysWOW64\wintask32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\wintask32.exeC:\Windows\system32\wintask32.exe 508 "C:\Windows\SysWOW64\wintask32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Windows\SysWOW64\wintask32.exeC:\Windows\system32\wintask32.exe 512 "C:\Windows\SysWOW64\wintask32.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\wintask32.exeC:\Windows\system32\wintask32.exe 528 "C:\Windows\SysWOW64\wintask32.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\SysWOW64\wintask32.exeC:\Windows\system32\wintask32.exe 520 "C:\Windows\SysWOW64\wintask32.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\wintask32.exeC:\Windows\system32\wintask32.exe 524 "C:\Windows\SysWOW64\wintask32.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\SysWOW64\wintask32.exeC:\Windows\system32\wintask32.exe 532 "C:\Windows\SysWOW64\wintask32.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\wintask32.exeC:\Windows\system32\wintask32.exe 536 "C:\Windows\SysWOW64\wintask32.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\wintask32.exeC:\Windows\system32\wintask32.exe 540 "C:\Windows\SysWOW64\wintask32.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2044
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
116KB
MD5b4410ebd1a7f254bc88f4d6a16047c30
SHA13ee004a087607a0b582870b431093ebc344725b1
SHA256db184bed6c94d4ec5ba45c3c3071a1a8882a7cd68210619cf8b829dfe409e7ee
SHA512d8354593a4a47a177906113427432edd9606dd095d44afec82a8fdd4e3178a5ec135dfc259d6041054d36b37c42446fdf49f8110776051154da507078f494b5f