Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 06:27
Static task
static1
Behavioral task
behavioral1
Sample
cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe
-
Size
240KB
-
MD5
cb81b52f6edde0ba925ca3c81c34f750
-
SHA1
0c531587f119db8eb9677593230e78dd4cce4059
-
SHA256
0ed2886eafa96354821a4cbe7b0a934f0fcb21ec13eefb30cb96e93aa8123685
-
SHA512
03fa72655090118c64db416b87afbfa26e6de5ff20c4528c86c9c65a688958445d0a49987da03fade9acb804f5c9426b7edc8410e3ea603c15ab8a6871437252
-
SSDEEP
6144:Y2MeMBlZXpUHLO7OGCdU8Iz3zPobd8EEEEEEEEEEEEEEEO:Y8MBlgrO7OGseim
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 4456 wingate32.exe 4984 wingate32.exe 2188 wingate32.exe 3916 wingate32.exe 4400 wingate32.exe 3308 wingate32.exe 772 wingate32.exe 4824 wingate32.exe 1840 wingate32.exe 3404 wingate32.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wingate32.exe cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2908 wrote to memory of 4456 2908 cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe 85 PID 2908 wrote to memory of 4456 2908 cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe 85 PID 2908 wrote to memory of 4456 2908 cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe 85 PID 4456 wrote to memory of 4984 4456 wingate32.exe 100 PID 4456 wrote to memory of 4984 4456 wingate32.exe 100 PID 4456 wrote to memory of 4984 4456 wingate32.exe 100 PID 4984 wrote to memory of 2188 4984 wingate32.exe 103 PID 4984 wrote to memory of 2188 4984 wingate32.exe 103 PID 4984 wrote to memory of 2188 4984 wingate32.exe 103 PID 2188 wrote to memory of 3916 2188 wingate32.exe 105 PID 2188 wrote to memory of 3916 2188 wingate32.exe 105 PID 2188 wrote to memory of 3916 2188 wingate32.exe 105 PID 3916 wrote to memory of 4400 3916 wingate32.exe 107 PID 3916 wrote to memory of 4400 3916 wingate32.exe 107 PID 3916 wrote to memory of 4400 3916 wingate32.exe 107 PID 4400 wrote to memory of 3308 4400 wingate32.exe 108 PID 4400 wrote to memory of 3308 4400 wingate32.exe 108 PID 4400 wrote to memory of 3308 4400 wingate32.exe 108 PID 3308 wrote to memory of 772 3308 wingate32.exe 109 PID 3308 wrote to memory of 772 3308 wingate32.exe 109 PID 3308 wrote to memory of 772 3308 wingate32.exe 109 PID 772 wrote to memory of 4824 772 wingate32.exe 110 PID 772 wrote to memory of 4824 772 wingate32.exe 110 PID 772 wrote to memory of 4824 772 wingate32.exe 110 PID 4824 wrote to memory of 1840 4824 wingate32.exe 111 PID 4824 wrote to memory of 1840 4824 wingate32.exe 111 PID 4824 wrote to memory of 1840 4824 wingate32.exe 111 PID 1840 wrote to memory of 3404 1840 wingate32.exe 112 PID 1840 wrote to memory of 3404 1840 wingate32.exe 112 PID 1840 wrote to memory of 3404 1840 wingate32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1164 "C:\Users\Admin\AppData\Local\Temp\cb81b52f6edde0ba925ca3c81c34f750_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1160 "C:\Windows\SysWOW64\wingate32.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1132 "C:\Windows\SysWOW64\wingate32.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1136 "C:\Windows\SysWOW64\wingate32.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1104 "C:\Windows\SysWOW64\wingate32.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1144 "C:\Windows\SysWOW64\wingate32.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1148 "C:\Windows\SysWOW64\wingate32.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1128 "C:\Windows\SysWOW64\wingate32.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1156 "C:\Windows\SysWOW64\wingate32.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 1176 "C:\Windows\SysWOW64\wingate32.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3404
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5cb81b52f6edde0ba925ca3c81c34f750
SHA10c531587f119db8eb9677593230e78dd4cce4059
SHA2560ed2886eafa96354821a4cbe7b0a934f0fcb21ec13eefb30cb96e93aa8123685
SHA51203fa72655090118c64db416b87afbfa26e6de5ff20c4528c86c9c65a688958445d0a49987da03fade9acb804f5c9426b7edc8410e3ea603c15ab8a6871437252