Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 19:27
Static task
static1
Behavioral task
behavioral1
Sample
bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe
-
Size
252KB
-
MD5
bee00aa04a0c303f859fe09928d67af9
-
SHA1
817b07124e6dcd6fa770739d4e80d66e61302480
-
SHA256
afa01ea31d1b8851d6f1e0019d89aa4b0efda83be79cf79916285051a4f042b0
-
SHA512
d9a58242cb9949def225ff33554d3f0709e0086d4c7c076d6719390c179e1861caea48fd75d3bab6a2a2126814645e9726754ac177a0134a349a285695886a91
-
SSDEEP
6144:S+1jLpNITtBenUaeoXZ5EHT2NP/4Y8Kc5A89Xa:5j1NYBny5EHO8ka
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 20 IoCs
pid Process 2876 wingate32.exe 2408 wingate32.exe 1816 wingate32.exe 1512 wingate32.exe 848 wingate32.exe 964 wingate32.exe 2492 wingate32.exe 2320 wingate32.exe 2344 wingate32.exe 1252 wingate32.exe 780 wingate32.exe 3028 wingate32.exe 1660 wingate32.exe 1632 wingate32.exe 1928 wingate32.exe 2428 wingate32.exe 2272 wingate32.exe 2420 wingate32.exe 1692 wingate32.exe 568 wingate32.exe -
Loads dropped DLL 21 IoCs
pid Process 2096 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 2096 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 2876 wingate32.exe 2408 wingate32.exe 2408 wingate32.exe 1512 wingate32.exe 1512 wingate32.exe 964 wingate32.exe 964 wingate32.exe 2320 wingate32.exe 2320 wingate32.exe 1252 wingate32.exe 1252 wingate32.exe 3028 wingate32.exe 3028 wingate32.exe 1632 wingate32.exe 1632 wingate32.exe 2428 wingate32.exe 2428 wingate32.exe 2420 wingate32.exe 2420 wingate32.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2264 set thread context of 2096 2264 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 30 PID 2876 set thread context of 2408 2876 wingate32.exe 32 PID 1816 set thread context of 1512 1816 wingate32.exe 35 PID 848 set thread context of 964 848 wingate32.exe 37 PID 2492 set thread context of 2320 2492 wingate32.exe 39 PID 2344 set thread context of 1252 2344 wingate32.exe 41 PID 780 set thread context of 3028 780 wingate32.exe 43 PID 1660 set thread context of 1632 1660 wingate32.exe 45 PID 1928 set thread context of 2428 1928 wingate32.exe 47 PID 2272 set thread context of 2420 2272 wingate32.exe 49 PID 1692 set thread context of 568 1692 wingate32.exe 51 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2096 2264 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2096 2264 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2096 2264 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2096 2264 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2096 2264 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2096 2264 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2096 2264 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2096 2264 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2096 2264 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2096 2264 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2096 2264 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2096 2264 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2876 2096 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 31 PID 2096 wrote to memory of 2876 2096 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 31 PID 2096 wrote to memory of 2876 2096 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 31 PID 2096 wrote to memory of 2876 2096 bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe 31 PID 2876 wrote to memory of 2408 2876 wingate32.exe 32 PID 2876 wrote to memory of 2408 2876 wingate32.exe 32 PID 2876 wrote to memory of 2408 2876 wingate32.exe 32 PID 2876 wrote to memory of 2408 2876 wingate32.exe 32 PID 2876 wrote to memory of 2408 2876 wingate32.exe 32 PID 2876 wrote to memory of 2408 2876 wingate32.exe 32 PID 2876 wrote to memory of 2408 2876 wingate32.exe 32 PID 2876 wrote to memory of 2408 2876 wingate32.exe 32 PID 2876 wrote to memory of 2408 2876 wingate32.exe 32 PID 2876 wrote to memory of 2408 2876 wingate32.exe 32 PID 2876 wrote to memory of 2408 2876 wingate32.exe 32 PID 2876 wrote to memory of 2408 2876 wingate32.exe 32 PID 2408 wrote to memory of 1816 2408 wingate32.exe 34 PID 2408 wrote to memory of 1816 2408 wingate32.exe 34 PID 2408 wrote to memory of 1816 2408 wingate32.exe 34 PID 2408 wrote to memory of 1816 2408 wingate32.exe 34 PID 1816 wrote to memory of 1512 1816 wingate32.exe 35 PID 1816 wrote to memory of 1512 1816 wingate32.exe 35 PID 1816 wrote to memory of 1512 1816 wingate32.exe 35 PID 1816 wrote to memory of 1512 1816 wingate32.exe 35 PID 1816 wrote to memory of 1512 1816 wingate32.exe 35 PID 1816 wrote to memory of 1512 1816 wingate32.exe 35 PID 1816 wrote to memory of 1512 1816 wingate32.exe 35 PID 1816 wrote to memory of 1512 1816 wingate32.exe 35 PID 1816 wrote to memory of 1512 1816 wingate32.exe 35 PID 1816 wrote to memory of 1512 1816 wingate32.exe 35 PID 1816 wrote to memory of 1512 1816 wingate32.exe 35 PID 1816 wrote to memory of 1512 1816 wingate32.exe 35 PID 1512 wrote to memory of 848 1512 wingate32.exe 36 PID 1512 wrote to memory of 848 1512 wingate32.exe 36 PID 1512 wrote to memory of 848 1512 wingate32.exe 36 PID 1512 wrote to memory of 848 1512 wingate32.exe 36 PID 848 wrote to memory of 964 848 wingate32.exe 37 PID 848 wrote to memory of 964 848 wingate32.exe 37 PID 848 wrote to memory of 964 848 wingate32.exe 37 PID 848 wrote to memory of 964 848 wingate32.exe 37 PID 848 wrote to memory of 964 848 wingate32.exe 37 PID 848 wrote to memory of 964 848 wingate32.exe 37 PID 848 wrote to memory of 964 848 wingate32.exe 37 PID 848 wrote to memory of 964 848 wingate32.exe 37 PID 848 wrote to memory of 964 848 wingate32.exe 37 PID 848 wrote to memory of 964 848 wingate32.exe 37 PID 848 wrote to memory of 964 848 wingate32.exe 37 PID 848 wrote to memory of 964 848 wingate32.exe 37 PID 964 wrote to memory of 2492 964 wingate32.exe 38 PID 964 wrote to memory of 2492 964 wingate32.exe 38 PID 964 wrote to memory of 2492 964 wingate32.exe 38 PID 964 wrote to memory of 2492 964 wingate32.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 508 "C:\Users\Admin\AppData\Local\Temp\bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 508 "C:\Users\Admin\AppData\Local\Temp\bee00aa04a0c303f859fe09928d67af9_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 504 "C:\Windows\SysWOW64\wingate32.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 504 "C:\Windows\SysWOW64\wingate32.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1252 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:780 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 512 "C:\Windows\SysWOW64\wingate32.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:568
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5bee00aa04a0c303f859fe09928d67af9
SHA1817b07124e6dcd6fa770739d4e80d66e61302480
SHA256afa01ea31d1b8851d6f1e0019d89aa4b0efda83be79cf79916285051a4f042b0
SHA512d9a58242cb9949def225ff33554d3f0709e0086d4c7c076d6719390c179e1861caea48fd75d3bab6a2a2126814645e9726754ac177a0134a349a285695886a91