Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 01:04
Static task
static1
Behavioral task
behavioral1
Sample
ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe
-
Size
293KB
-
MD5
ca45656aede7dd59ce1f0e140ed3391d
-
SHA1
4614358a0a05588aafe824ec7f35196f048726f8
-
SHA256
26462fd0046d0e35130b7931e63f887038fe471c007102523636e7c7ae12a8ed
-
SHA512
ae1e4438df23f90ce582097c51188c55e19946433427fb1469c941ffe3fdf5c139e4c9f0c220136e44ca2dce3f730035cc3007f2f300d5555d014ee6ecb4920f
-
SSDEEP
6144:E08wLkUthveqDaWM8HleuLPJ+FFWVaJOHO4TyQOI5JgpcvqNplc4F4bsVYexH:E08MkUDvwoeiPMFFJJCXT0Iw5p4brGH
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 2860 taskmrg.exe 2640 taskmrg.exe 2128 taskmrg.exe 1208 taskmrg.exe 1908 taskmrg.exe 680 taskmrg.exe 1716 taskmrg.exe 1864 taskmrg.exe 3032 taskmrg.exe 1292 taskmrg.exe -
Loads dropped DLL 20 IoCs
pid Process 1444 ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe 1444 ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe 2860 taskmrg.exe 2860 taskmrg.exe 2640 taskmrg.exe 2640 taskmrg.exe 2128 taskmrg.exe 2128 taskmrg.exe 1208 taskmrg.exe 1208 taskmrg.exe 1908 taskmrg.exe 1908 taskmrg.exe 680 taskmrg.exe 680 taskmrg.exe 1716 taskmrg.exe 1716 taskmrg.exe 1864 taskmrg.exe 1864 taskmrg.exe 3032 taskmrg.exe 3032 taskmrg.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 11 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe File opened for modification \??\PhysicalDrive0 taskmrg.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe -
Modifies registry class 33 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2860 1444 ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe 31 PID 1444 wrote to memory of 2860 1444 ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe 31 PID 1444 wrote to memory of 2860 1444 ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe 31 PID 1444 wrote to memory of 2860 1444 ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe 31 PID 2860 wrote to memory of 2640 2860 taskmrg.exe 32 PID 2860 wrote to memory of 2640 2860 taskmrg.exe 32 PID 2860 wrote to memory of 2640 2860 taskmrg.exe 32 PID 2860 wrote to memory of 2640 2860 taskmrg.exe 32 PID 2640 wrote to memory of 2128 2640 taskmrg.exe 33 PID 2640 wrote to memory of 2128 2640 taskmrg.exe 33 PID 2640 wrote to memory of 2128 2640 taskmrg.exe 33 PID 2640 wrote to memory of 2128 2640 taskmrg.exe 33 PID 2128 wrote to memory of 1208 2128 taskmrg.exe 34 PID 2128 wrote to memory of 1208 2128 taskmrg.exe 34 PID 2128 wrote to memory of 1208 2128 taskmrg.exe 34 PID 2128 wrote to memory of 1208 2128 taskmrg.exe 34 PID 1208 wrote to memory of 1908 1208 taskmrg.exe 35 PID 1208 wrote to memory of 1908 1208 taskmrg.exe 35 PID 1208 wrote to memory of 1908 1208 taskmrg.exe 35 PID 1208 wrote to memory of 1908 1208 taskmrg.exe 35 PID 1908 wrote to memory of 680 1908 taskmrg.exe 37 PID 1908 wrote to memory of 680 1908 taskmrg.exe 37 PID 1908 wrote to memory of 680 1908 taskmrg.exe 37 PID 1908 wrote to memory of 680 1908 taskmrg.exe 37 PID 680 wrote to memory of 1716 680 taskmrg.exe 38 PID 680 wrote to memory of 1716 680 taskmrg.exe 38 PID 680 wrote to memory of 1716 680 taskmrg.exe 38 PID 680 wrote to memory of 1716 680 taskmrg.exe 38 PID 1716 wrote to memory of 1864 1716 taskmrg.exe 39 PID 1716 wrote to memory of 1864 1716 taskmrg.exe 39 PID 1716 wrote to memory of 1864 1716 taskmrg.exe 39 PID 1716 wrote to memory of 1864 1716 taskmrg.exe 39 PID 1864 wrote to memory of 3032 1864 taskmrg.exe 40 PID 1864 wrote to memory of 3032 1864 taskmrg.exe 40 PID 1864 wrote to memory of 3032 1864 taskmrg.exe 40 PID 1864 wrote to memory of 3032 1864 taskmrg.exe 40 PID 3032 wrote to memory of 1292 3032 taskmrg.exe 41 PID 3032 wrote to memory of 1292 3032 taskmrg.exe 41 PID 3032 wrote to memory of 1292 3032 taskmrg.exe 41 PID 3032 wrote to memory of 1292 3032 taskmrg.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 552 "C:\Users\Admin\AppData\Local\Temp\ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 544 "C:\Windows\SysWOW64\taskmrg.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 608 "C:\Windows\SysWOW64\taskmrg.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 560 "C:\Windows\SysWOW64\taskmrg.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 564 "C:\Windows\SysWOW64\taskmrg.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 572 "C:\Windows\SysWOW64\taskmrg.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 568 "C:\Windows\SysWOW64\taskmrg.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 548 "C:\Windows\SysWOW64\taskmrg.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 644 "C:\Windows\SysWOW64\taskmrg.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 556 "C:\Windows\SysWOW64\taskmrg.exe"11⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1292
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293KB
MD5ca45656aede7dd59ce1f0e140ed3391d
SHA14614358a0a05588aafe824ec7f35196f048726f8
SHA25626462fd0046d0e35130b7931e63f887038fe471c007102523636e7c7ae12a8ed
SHA512ae1e4438df23f90ce582097c51188c55e19946433427fb1469c941ffe3fdf5c139e4c9f0c220136e44ca2dce3f730035cc3007f2f300d5555d014ee6ecb4920f