Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe
-
Size
240KB
-
MD5
cb81b52f6edde0ba925ca3c81c34f750
-
SHA1
0c531587f119db8eb9677593230e78dd4cce4059
-
SHA256
0ed2886eafa96354821a4cbe7b0a934f0fcb21ec13eefb30cb96e93aa8123685
-
SHA512
03fa72655090118c64db416b87afbfa26e6de5ff20c4528c86c9c65a688958445d0a49987da03fade9acb804f5c9426b7edc8410e3ea603c15ab8a6871437252
-
SSDEEP
6144:Y2MeMBlZXpUHLO7OGCdU8Iz3zPobd8EEEEEEEEEEEEEEEO:Y8MBlgrO7OGseim
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 2712 wingate32.exe 1752 wingate32.exe 1540 wingate32.exe 2172 wingate32.exe 300 wingate32.exe 1696 wingate32.exe 648 wingate32.exe 2488 wingate32.exe 1504 wingate32.exe 660 wingate32.exe -
Loads dropped DLL 20 IoCs
pid Process 2720 cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe 2720 cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe 2712 wingate32.exe 2712 wingate32.exe 1752 wingate32.exe 1752 wingate32.exe 1540 wingate32.exe 1540 wingate32.exe 2172 wingate32.exe 2172 wingate32.exe 300 wingate32.exe 300 wingate32.exe 1696 wingate32.exe 1696 wingate32.exe 648 wingate32.exe 648 wingate32.exe 2488 wingate32.exe 2488 wingate32.exe 1504 wingate32.exe 1504 wingate32.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2712 2720 cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2712 2720 cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2712 2720 cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2712 2720 cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe 30 PID 2712 wrote to memory of 1752 2712 wingate32.exe 31 PID 2712 wrote to memory of 1752 2712 wingate32.exe 31 PID 2712 wrote to memory of 1752 2712 wingate32.exe 31 PID 2712 wrote to memory of 1752 2712 wingate32.exe 31 PID 1752 wrote to memory of 1540 1752 wingate32.exe 32 PID 1752 wrote to memory of 1540 1752 wingate32.exe 32 PID 1752 wrote to memory of 1540 1752 wingate32.exe 32 PID 1752 wrote to memory of 1540 1752 wingate32.exe 32 PID 1540 wrote to memory of 2172 1540 wingate32.exe 33 PID 1540 wrote to memory of 2172 1540 wingate32.exe 33 PID 1540 wrote to memory of 2172 1540 wingate32.exe 33 PID 1540 wrote to memory of 2172 1540 wingate32.exe 33 PID 2172 wrote to memory of 300 2172 wingate32.exe 34 PID 2172 wrote to memory of 300 2172 wingate32.exe 34 PID 2172 wrote to memory of 300 2172 wingate32.exe 34 PID 2172 wrote to memory of 300 2172 wingate32.exe 34 PID 300 wrote to memory of 1696 300 wingate32.exe 36 PID 300 wrote to memory of 1696 300 wingate32.exe 36 PID 300 wrote to memory of 1696 300 wingate32.exe 36 PID 300 wrote to memory of 1696 300 wingate32.exe 36 PID 1696 wrote to memory of 648 1696 wingate32.exe 37 PID 1696 wrote to memory of 648 1696 wingate32.exe 37 PID 1696 wrote to memory of 648 1696 wingate32.exe 37 PID 1696 wrote to memory of 648 1696 wingate32.exe 37 PID 648 wrote to memory of 2488 648 wingate32.exe 38 PID 648 wrote to memory of 2488 648 wingate32.exe 38 PID 648 wrote to memory of 2488 648 wingate32.exe 38 PID 648 wrote to memory of 2488 648 wingate32.exe 38 PID 2488 wrote to memory of 1504 2488 wingate32.exe 39 PID 2488 wrote to memory of 1504 2488 wingate32.exe 39 PID 2488 wrote to memory of 1504 2488 wingate32.exe 39 PID 2488 wrote to memory of 1504 2488 wingate32.exe 39 PID 1504 wrote to memory of 660 1504 wingate32.exe 40 PID 1504 wrote to memory of 660 1504 wingate32.exe 40 PID 1504 wrote to memory of 660 1504 wingate32.exe 40 PID 1504 wrote to memory of 660 1504 wingate32.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 488 "C:\Users\Admin\AppData\Local\Temp\cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 536 "C:\Windows\SysWOW64\wingate32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 540 "C:\Windows\SysWOW64\wingate32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 552 "C:\Windows\SysWOW64\wingate32.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 556 "C:\Windows\SysWOW64\wingate32.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:300 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 528 "C:\Windows\SysWOW64\wingate32.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 532 "C:\Windows\SysWOW64\wingate32.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 560 "C:\Windows\SysWOW64\wingate32.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 564 "C:\Windows\SysWOW64\wingate32.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 544 "C:\Windows\SysWOW64\wingate32.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:660
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5cb81b52f6edde0ba925ca3c81c34f750
SHA10c531587f119db8eb9677593230e78dd4cce4059
SHA2560ed2886eafa96354821a4cbe7b0a934f0fcb21ec13eefb30cb96e93aa8123685
SHA51203fa72655090118c64db416b87afbfa26e6de5ff20c4528c86c9c65a688958445d0a49987da03fade9acb804f5c9426b7edc8410e3ea603c15ab8a6871437252