Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 01:04
Static task
static1
Behavioral task
behavioral1
Sample
ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe
-
Size
293KB
-
MD5
ca45656aede7dd59ce1f0e140ed3391d
-
SHA1
4614358a0a05588aafe824ec7f35196f048726f8
-
SHA256
26462fd0046d0e35130b7931e63f887038fe471c007102523636e7c7ae12a8ed
-
SHA512
ae1e4438df23f90ce582097c51188c55e19946433427fb1469c941ffe3fdf5c139e4c9f0c220136e44ca2dce3f730035cc3007f2f300d5555d014ee6ecb4920f
-
SSDEEP
6144:E08wLkUthveqDaWM8HleuLPJ+FFWVaJOHO4TyQOI5JgpcvqNplc4F4bsVYexH:E08MkUDvwoeiPMFFJJCXT0Iw5p4brGH
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 1424 taskmrg.exe 4820 taskmrg.exe 736 taskmrg.exe 3748 taskmrg.exe 3608 taskmrg.exe 4216 taskmrg.exe 4112 taskmrg.exe 4264 taskmrg.exe 3108 taskmrg.exe 4748 taskmrg.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe File created C:\Windows\SysWOW64\taskmrg.exe taskmrg.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmrg.exe -
Modifies registry class 33 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" taskmrg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key taskmrg.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2784 wrote to memory of 1424 2784 ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe 83 PID 2784 wrote to memory of 1424 2784 ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe 83 PID 2784 wrote to memory of 1424 2784 ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe 83 PID 1424 wrote to memory of 4820 1424 taskmrg.exe 93 PID 1424 wrote to memory of 4820 1424 taskmrg.exe 93 PID 1424 wrote to memory of 4820 1424 taskmrg.exe 93 PID 4820 wrote to memory of 736 4820 taskmrg.exe 100 PID 4820 wrote to memory of 736 4820 taskmrg.exe 100 PID 4820 wrote to memory of 736 4820 taskmrg.exe 100 PID 736 wrote to memory of 3748 736 taskmrg.exe 102 PID 736 wrote to memory of 3748 736 taskmrg.exe 102 PID 736 wrote to memory of 3748 736 taskmrg.exe 102 PID 3748 wrote to memory of 3608 3748 taskmrg.exe 104 PID 3748 wrote to memory of 3608 3748 taskmrg.exe 104 PID 3748 wrote to memory of 3608 3748 taskmrg.exe 104 PID 3608 wrote to memory of 4216 3608 taskmrg.exe 105 PID 3608 wrote to memory of 4216 3608 taskmrg.exe 105 PID 3608 wrote to memory of 4216 3608 taskmrg.exe 105 PID 4216 wrote to memory of 4112 4216 taskmrg.exe 106 PID 4216 wrote to memory of 4112 4216 taskmrg.exe 106 PID 4216 wrote to memory of 4112 4216 taskmrg.exe 106 PID 4112 wrote to memory of 4264 4112 taskmrg.exe 107 PID 4112 wrote to memory of 4264 4112 taskmrg.exe 107 PID 4112 wrote to memory of 4264 4112 taskmrg.exe 107 PID 4264 wrote to memory of 3108 4264 taskmrg.exe 108 PID 4264 wrote to memory of 3108 4264 taskmrg.exe 108 PID 4264 wrote to memory of 3108 4264 taskmrg.exe 108 PID 3108 wrote to memory of 4748 3108 taskmrg.exe 109 PID 3108 wrote to memory of 4748 3108 taskmrg.exe 109 PID 3108 wrote to memory of 4748 3108 taskmrg.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1088 "C:\Users\Admin\AppData\Local\Temp\ca45656aede7dd59ce1f0e140ed3391d_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1192 "C:\Windows\SysWOW64\taskmrg.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4820 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1168 "C:\Windows\SysWOW64\taskmrg.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1164 "C:\Windows\SysWOW64\taskmrg.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1180 "C:\Windows\SysWOW64\taskmrg.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1176 "C:\Windows\SysWOW64\taskmrg.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1172 "C:\Windows\SysWOW64\taskmrg.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4112 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1188 "C:\Windows\SysWOW64\taskmrg.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1184 "C:\Windows\SysWOW64\taskmrg.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\taskmrg.exeC:\Windows\system32\taskmrg.exe 1200 "C:\Windows\SysWOW64\taskmrg.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4748
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
293KB
MD5ca45656aede7dd59ce1f0e140ed3391d
SHA14614358a0a05588aafe824ec7f35196f048726f8
SHA25626462fd0046d0e35130b7931e63f887038fe471c007102523636e7c7ae12a8ed
SHA512ae1e4438df23f90ce582097c51188c55e19946433427fb1469c941ffe3fdf5c139e4c9f0c220136e44ca2dce3f730035cc3007f2f300d5555d014ee6ecb4920f