Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 22:59
Static task
static1
Behavioral task
behavioral1
Sample
c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe
-
Size
496KB
-
MD5
c9cb09702d6b75d5b8252df08dcd0027
-
SHA1
6f970d037569f0cbce6f7fe69138c6a420d0c6f4
-
SHA256
0dda61cd0a7b7da3e0671742af1164c22b5366120641d8ffa842424436a68874
-
SHA512
5b99d0e832e6572802330ecfa02b28e768b240d3ad7f04a645100e20cd4719b8931cbe40062a0148f7e13aef1f9facf27b2f7cb92988454bf891de2688fac326
-
SSDEEP
6144:n3sGVHIL/GWMn5XQWSI6UpWuLU/ivGVpR+Lcdu/BeBsZPJjgfaL+Kl6:cAjnAWcUI04ieYyuckPJ8Ic
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 20 IoCs
pid Process 4340 msq24.exe 4512 msq24.exe 4380 msq24.exe 2960 msq24.exe 2868 msq24.exe 4576 msq24.exe 3080 msq24.exe 3432 msq24.exe 460 msq24.exe 2188 msq24.exe 4064 msq24.exe 1620 msq24.exe 756 msq24.exe 4148 msq24.exe 1736 msq24.exe 2340 msq24.exe 1672 msq24.exe 2680 msq24.exe 2944 msq24.exe 2420 msq24.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msq24.exe c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File created C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File created C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File created C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File created C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File created C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File created C:\Windows\SysWOW64\msq24.exe msq24.exe File created C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File created C:\Windows\SysWOW64\msq24.exe c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe File created C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File created C:\Windows\SysWOW64\msq24.exe msq24.exe File created C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe File opened for modification C:\Windows\SysWOW64\msq24.exe msq24.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 4624 set thread context of 368 4624 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 82 PID 4340 set thread context of 4512 4340 msq24.exe 84 PID 4380 set thread context of 2960 4380 msq24.exe 91 PID 2868 set thread context of 4576 2868 msq24.exe 96 PID 3080 set thread context of 3432 3080 msq24.exe 99 PID 460 set thread context of 2188 460 msq24.exe 101 PID 4064 set thread context of 1620 4064 msq24.exe 103 PID 756 set thread context of 4148 756 msq24.exe 105 PID 1736 set thread context of 2340 1736 msq24.exe 107 PID 1672 set thread context of 2680 1672 msq24.exe 109 PID 2944 set thread context of 2420 2944 msq24.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msq24.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 4624 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 4340 msq24.exe 4380 msq24.exe 2868 msq24.exe 3080 msq24.exe 460 msq24.exe 4064 msq24.exe 756 msq24.exe 1736 msq24.exe 1672 msq24.exe 2944 msq24.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4624 wrote to memory of 368 4624 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 82 PID 4624 wrote to memory of 368 4624 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 82 PID 4624 wrote to memory of 368 4624 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 82 PID 4624 wrote to memory of 368 4624 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 82 PID 4624 wrote to memory of 368 4624 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 82 PID 4624 wrote to memory of 368 4624 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 82 PID 4624 wrote to memory of 368 4624 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 82 PID 4624 wrote to memory of 368 4624 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 82 PID 4624 wrote to memory of 368 4624 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 82 PID 4624 wrote to memory of 368 4624 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 82 PID 4624 wrote to memory of 368 4624 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 82 PID 368 wrote to memory of 4340 368 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 83 PID 368 wrote to memory of 4340 368 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 83 PID 368 wrote to memory of 4340 368 c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe 83 PID 4340 wrote to memory of 4512 4340 msq24.exe 84 PID 4340 wrote to memory of 4512 4340 msq24.exe 84 PID 4340 wrote to memory of 4512 4340 msq24.exe 84 PID 4340 wrote to memory of 4512 4340 msq24.exe 84 PID 4340 wrote to memory of 4512 4340 msq24.exe 84 PID 4340 wrote to memory of 4512 4340 msq24.exe 84 PID 4340 wrote to memory of 4512 4340 msq24.exe 84 PID 4340 wrote to memory of 4512 4340 msq24.exe 84 PID 4340 wrote to memory of 4512 4340 msq24.exe 84 PID 4340 wrote to memory of 4512 4340 msq24.exe 84 PID 4340 wrote to memory of 4512 4340 msq24.exe 84 PID 4512 wrote to memory of 4380 4512 msq24.exe 90 PID 4512 wrote to memory of 4380 4512 msq24.exe 90 PID 4512 wrote to memory of 4380 4512 msq24.exe 90 PID 4380 wrote to memory of 2960 4380 msq24.exe 91 PID 4380 wrote to memory of 2960 4380 msq24.exe 91 PID 4380 wrote to memory of 2960 4380 msq24.exe 91 PID 4380 wrote to memory of 2960 4380 msq24.exe 91 PID 4380 wrote to memory of 2960 4380 msq24.exe 91 PID 4380 wrote to memory of 2960 4380 msq24.exe 91 PID 4380 wrote to memory of 2960 4380 msq24.exe 91 PID 4380 wrote to memory of 2960 4380 msq24.exe 91 PID 4380 wrote to memory of 2960 4380 msq24.exe 91 PID 4380 wrote to memory of 2960 4380 msq24.exe 91 PID 4380 wrote to memory of 2960 4380 msq24.exe 91 PID 2960 wrote to memory of 2868 2960 msq24.exe 95 PID 2960 wrote to memory of 2868 2960 msq24.exe 95 PID 2960 wrote to memory of 2868 2960 msq24.exe 95 PID 2868 wrote to memory of 4576 2868 msq24.exe 96 PID 2868 wrote to memory of 4576 2868 msq24.exe 96 PID 2868 wrote to memory of 4576 2868 msq24.exe 96 PID 2868 wrote to memory of 4576 2868 msq24.exe 96 PID 2868 wrote to memory of 4576 2868 msq24.exe 96 PID 2868 wrote to memory of 4576 2868 msq24.exe 96 PID 2868 wrote to memory of 4576 2868 msq24.exe 96 PID 2868 wrote to memory of 4576 2868 msq24.exe 96 PID 2868 wrote to memory of 4576 2868 msq24.exe 96 PID 2868 wrote to memory of 4576 2868 msq24.exe 96 PID 2868 wrote to memory of 4576 2868 msq24.exe 96 PID 4576 wrote to memory of 3080 4576 msq24.exe 98 PID 4576 wrote to memory of 3080 4576 msq24.exe 98 PID 4576 wrote to memory of 3080 4576 msq24.exe 98 PID 3080 wrote to memory of 3432 3080 msq24.exe 99 PID 3080 wrote to memory of 3432 3080 msq24.exe 99 PID 3080 wrote to memory of 3432 3080 msq24.exe 99 PID 3080 wrote to memory of 3432 3080 msq24.exe 99 PID 3080 wrote to memory of 3432 3080 msq24.exe 99 PID 3080 wrote to memory of 3432 3080 msq24.exe 99 PID 3080 wrote to memory of 3432 3080 msq24.exe 99 PID 3080 wrote to memory of 3432 3080 msq24.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Windows\SysWOW64\msq24.exeC:\Windows\system32\msq24.exe 1120 "C:\Users\Admin\AppData\Local\Temp\c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Windows\SysWOW64\msq24.exe1120 "C:\Users\Admin\AppData\Local\Temp\c9cb09702d6b75d5b8252df08dcd0027_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\SysWOW64\msq24.exeC:\Windows\system32\msq24.exe 1148 "C:\Windows\SysWOW64\msq24.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\SysWOW64\msq24.exe1148 "C:\Windows\SysWOW64\msq24.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\msq24.exeC:\Windows\system32\msq24.exe 1120 "C:\Windows\SysWOW64\msq24.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\SysWOW64\msq24.exe1120 "C:\Windows\SysWOW64\msq24.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\SysWOW64\msq24.exeC:\Windows\system32\msq24.exe 1120 "C:\Windows\SysWOW64\msq24.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\SysWOW64\msq24.exe1120 "C:\Windows\SysWOW64\msq24.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3432 -
C:\Windows\SysWOW64\msq24.exeC:\Windows\system32\msq24.exe 1124 "C:\Windows\SysWOW64\msq24.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:460 -
C:\Windows\SysWOW64\msq24.exe1124 "C:\Windows\SysWOW64\msq24.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Windows\SysWOW64\msq24.exeC:\Windows\system32\msq24.exe 1124 "C:\Windows\SysWOW64\msq24.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4064 -
C:\Windows\SysWOW64\msq24.exe1124 "C:\Windows\SysWOW64\msq24.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\msq24.exeC:\Windows\system32\msq24.exe 1120 "C:\Windows\SysWOW64\msq24.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:756 -
C:\Windows\SysWOW64\msq24.exe1120 "C:\Windows\SysWOW64\msq24.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4148 -
C:\Windows\SysWOW64\msq24.exeC:\Windows\system32\msq24.exe 1124 "C:\Windows\SysWOW64\msq24.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Windows\SysWOW64\msq24.exe1124 "C:\Windows\SysWOW64\msq24.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Windows\SysWOW64\msq24.exeC:\Windows\system32\msq24.exe 1140 "C:\Windows\SysWOW64\msq24.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Windows\SysWOW64\msq24.exe1140 "C:\Windows\SysWOW64\msq24.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\SysWOW64\msq24.exeC:\Windows\system32\msq24.exe 1120 "C:\Windows\SysWOW64\msq24.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2944 -
C:\Windows\SysWOW64\msq24.exe1120 "C:\Windows\SysWOW64\msq24.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2420
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
496KB
MD5c9cb09702d6b75d5b8252df08dcd0027
SHA16f970d037569f0cbce6f7fe69138c6a420d0c6f4
SHA2560dda61cd0a7b7da3e0671742af1164c22b5366120641d8ffa842424436a68874
SHA5125b99d0e832e6572802330ecfa02b28e768b240d3ad7f04a645100e20cd4719b8931cbe40062a0148f7e13aef1f9facf27b2f7cb92988454bf891de2688fac326