Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 16:52
Static task
static1
Behavioral task
behavioral1
Sample
c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe
-
Size
296KB
-
MD5
c89cbdac0aeef950298a1f0e0fc98d25
-
SHA1
f19456969d46531c0b7e8dbc8ef1f9b245debf53
-
SHA256
eb158c6c62b80b3793a57bef024e8963faec14f377d5d763af418b13f4bd31be
-
SHA512
d707580d450dbb218dd943ad1a5e1181244c8f1516eef012454d3c1c230b46bd716285d5cd11d70d421b41112881ae1ec6121f555f63e9ecdef0b4ccb95a6bb6
-
SSDEEP
6144:eXAIn/4ftH77TP3i7xg8qQRY701qvDa5Fiv5dvcdW:eXAIAlTPQxqQUrYFCzcdW
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 20 IoCs
pid Process 3516 winIogon.exe 604 winIogon.exe 4244 winIogon.exe 2656 winIogon.exe 1224 winIogon.exe 4612 winIogon.exe 4120 winIogon.exe 860 winIogon.exe 1552 winIogon.exe 3820 winIogon.exe 4884 winIogon.exe 724 winIogon.exe 2980 winIogon.exe 3504 winIogon.exe 3608 winIogon.exe 4596 winIogon.exe 3964 winIogon.exe 3160 winIogon.exe 4508 winIogon.exe 2292 winIogon.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\winIogon.exe winIogon.exe File created C:\Windows\SysWOW64\winIogon.exe winIogon.exe File opened for modification C:\Windows\SysWOW64\winIogon.exe winIogon.exe File created C:\Windows\SysWOW64\winIogon.exe winIogon.exe File opened for modification C:\Windows\SysWOW64\winIogon.exe winIogon.exe File opened for modification C:\Windows\SysWOW64\winIogon.exe winIogon.exe File opened for modification C:\Windows\SysWOW64\winIogon.exe winIogon.exe File opened for modification C:\Windows\SysWOW64\winIogon.exe c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe File created C:\Windows\SysWOW64\winIogon.exe winIogon.exe File opened for modification C:\Windows\SysWOW64\winIogon.exe winIogon.exe File created C:\Windows\SysWOW64\winIogon.exe winIogon.exe File opened for modification C:\Windows\SysWOW64\winIogon.exe winIogon.exe File created C:\Windows\SysWOW64\winIogon.exe winIogon.exe File opened for modification C:\Windows\SysWOW64\winIogon.exe winIogon.exe File created C:\Windows\SysWOW64\winIogon.exe winIogon.exe File created C:\Windows\SysWOW64\winIogon.exe c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\winIogon.exe winIogon.exe File created C:\Windows\SysWOW64\winIogon.exe winIogon.exe File created C:\Windows\SysWOW64\winIogon.exe winIogon.exe File opened for modification C:\Windows\SysWOW64\winIogon.exe winIogon.exe File created C:\Windows\SysWOW64\winIogon.exe winIogon.exe File opened for modification C:\Windows\SysWOW64\winIogon.exe winIogon.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 3808 set thread context of 4708 3808 c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe 82 PID 3516 set thread context of 604 3516 winIogon.exe 84 PID 4244 set thread context of 2656 4244 winIogon.exe 93 PID 1224 set thread context of 4612 1224 winIogon.exe 96 PID 4120 set thread context of 860 4120 winIogon.exe 99 PID 1552 set thread context of 3820 1552 winIogon.exe 101 PID 4884 set thread context of 724 4884 winIogon.exe 103 PID 2980 set thread context of 3504 2980 winIogon.exe 105 PID 3608 set thread context of 4596 3608 winIogon.exe 107 PID 3964 set thread context of 3160 3964 winIogon.exe 109 PID 4508 set thread context of 2292 4508 winIogon.exe 111 -
System Location Discovery: System Language Discovery 1 TTPs 21 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winIogon.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3808 c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe 3516 winIogon.exe 4244 winIogon.exe 1224 winIogon.exe 4120 winIogon.exe 1552 winIogon.exe 4884 winIogon.exe 2980 winIogon.exe 3608 winIogon.exe 3964 winIogon.exe 4508 winIogon.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3808 wrote to memory of 4708 3808 c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe 82 PID 3808 wrote to memory of 4708 3808 c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe 82 PID 3808 wrote to memory of 4708 3808 c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe 82 PID 3808 wrote to memory of 4708 3808 c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe 82 PID 3808 wrote to memory of 4708 3808 c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe 82 PID 3808 wrote to memory of 4708 3808 c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe 82 PID 3808 wrote to memory of 4708 3808 c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe 82 PID 3808 wrote to memory of 4708 3808 c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe 82 PID 4708 wrote to memory of 3516 4708 c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe 83 PID 4708 wrote to memory of 3516 4708 c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe 83 PID 4708 wrote to memory of 3516 4708 c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe 83 PID 3516 wrote to memory of 604 3516 winIogon.exe 84 PID 3516 wrote to memory of 604 3516 winIogon.exe 84 PID 3516 wrote to memory of 604 3516 winIogon.exe 84 PID 3516 wrote to memory of 604 3516 winIogon.exe 84 PID 3516 wrote to memory of 604 3516 winIogon.exe 84 PID 3516 wrote to memory of 604 3516 winIogon.exe 84 PID 3516 wrote to memory of 604 3516 winIogon.exe 84 PID 3516 wrote to memory of 604 3516 winIogon.exe 84 PID 604 wrote to memory of 4244 604 winIogon.exe 92 PID 604 wrote to memory of 4244 604 winIogon.exe 92 PID 604 wrote to memory of 4244 604 winIogon.exe 92 PID 4244 wrote to memory of 2656 4244 winIogon.exe 93 PID 4244 wrote to memory of 2656 4244 winIogon.exe 93 PID 4244 wrote to memory of 2656 4244 winIogon.exe 93 PID 4244 wrote to memory of 2656 4244 winIogon.exe 93 PID 4244 wrote to memory of 2656 4244 winIogon.exe 93 PID 4244 wrote to memory of 2656 4244 winIogon.exe 93 PID 4244 wrote to memory of 2656 4244 winIogon.exe 93 PID 4244 wrote to memory of 2656 4244 winIogon.exe 93 PID 2656 wrote to memory of 1224 2656 winIogon.exe 95 PID 2656 wrote to memory of 1224 2656 winIogon.exe 95 PID 2656 wrote to memory of 1224 2656 winIogon.exe 95 PID 1224 wrote to memory of 4612 1224 winIogon.exe 96 PID 1224 wrote to memory of 4612 1224 winIogon.exe 96 PID 1224 wrote to memory of 4612 1224 winIogon.exe 96 PID 1224 wrote to memory of 4612 1224 winIogon.exe 96 PID 1224 wrote to memory of 4612 1224 winIogon.exe 96 PID 1224 wrote to memory of 4612 1224 winIogon.exe 96 PID 1224 wrote to memory of 4612 1224 winIogon.exe 96 PID 1224 wrote to memory of 4612 1224 winIogon.exe 96 PID 4612 wrote to memory of 4120 4612 winIogon.exe 98 PID 4612 wrote to memory of 4120 4612 winIogon.exe 98 PID 4612 wrote to memory of 4120 4612 winIogon.exe 98 PID 4120 wrote to memory of 860 4120 winIogon.exe 99 PID 4120 wrote to memory of 860 4120 winIogon.exe 99 PID 4120 wrote to memory of 860 4120 winIogon.exe 99 PID 4120 wrote to memory of 860 4120 winIogon.exe 99 PID 4120 wrote to memory of 860 4120 winIogon.exe 99 PID 4120 wrote to memory of 860 4120 winIogon.exe 99 PID 4120 wrote to memory of 860 4120 winIogon.exe 99 PID 4120 wrote to memory of 860 4120 winIogon.exe 99 PID 860 wrote to memory of 1552 860 winIogon.exe 100 PID 860 wrote to memory of 1552 860 winIogon.exe 100 PID 860 wrote to memory of 1552 860 winIogon.exe 100 PID 1552 wrote to memory of 3820 1552 winIogon.exe 101 PID 1552 wrote to memory of 3820 1552 winIogon.exe 101 PID 1552 wrote to memory of 3820 1552 winIogon.exe 101 PID 1552 wrote to memory of 3820 1552 winIogon.exe 101 PID 1552 wrote to memory of 3820 1552 winIogon.exe 101 PID 1552 wrote to memory of 3820 1552 winIogon.exe 101 PID 1552 wrote to memory of 3820 1552 winIogon.exe 101 PID 1552 wrote to memory of 3820 1552 winIogon.exe 101 PID 3820 wrote to memory of 4884 3820 winIogon.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\system32\winIogon.exe 972 "C:\Users\Admin\AppData\Local\Temp\c89cbdac0aeef950298a1f0e0fc98d25_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\SysWOW64\winIogon.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\system32\winIogon.exe 1128 "C:\Windows\SysWOW64\winIogon.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\SysWOW64\winIogon.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\system32\winIogon.exe 1092 "C:\Windows\SysWOW64\winIogon.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\SysWOW64\winIogon.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\system32\winIogon.exe 1096 "C:\Windows\SysWOW64\winIogon.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\SysWOW64\winIogon.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\system32\winIogon.exe 1092 "C:\Windows\SysWOW64\winIogon.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\SysWOW64\winIogon.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3820 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\system32\winIogon.exe 1096 "C:\Windows\SysWOW64\winIogon.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4884 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\SysWOW64\winIogon.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:724 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\system32\winIogon.exe 1092 "C:\Windows\SysWOW64\winIogon.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2980 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\SysWOW64\winIogon.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3504 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\system32\winIogon.exe 1092 "C:\Windows\SysWOW64\winIogon.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3608 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\SysWOW64\winIogon.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4596 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\system32\winIogon.exe 1092 "C:\Windows\SysWOW64\winIogon.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3964 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\SysWOW64\winIogon.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3160 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\system32\winIogon.exe 1092 "C:\Windows\SysWOW64\winIogon.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4508 -
C:\Windows\SysWOW64\winIogon.exeC:\Windows\SysWOW64\winIogon.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2292
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
296KB
MD5c89cbdac0aeef950298a1f0e0fc98d25
SHA1f19456969d46531c0b7e8dbc8ef1f9b245debf53
SHA256eb158c6c62b80b3793a57bef024e8963faec14f377d5d763af418b13f4bd31be
SHA512d707580d450dbb218dd943ad1a5e1181244c8f1516eef012454d3c1c230b46bd716285d5cd11d70d421b41112881ae1ec6121f555f63e9ecdef0b4ccb95a6bb6