Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
07-12-2024 21:23
Static task
static1
Behavioral task
behavioral1
Sample
d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe
-
Size
151KB
-
MD5
d3ad4c380b0ddb12a8c5c257b2711d8c
-
SHA1
e93ec344f3438f9f2ce2bf42525b8c7dbab12b17
-
SHA256
e3b841147ca54c4dd61940fbbbbb9894d28a70a576f0c3f793dd9c70e5d22fe5
-
SHA512
bee59270e5af3ec6c5c64ee2228508be1d113a825ea1e750ef54a9202286b7ed873eafdc1165c83bca7ce0852e1bcf8bd356006e0a5fea1d2dd3849209df467d
-
SSDEEP
3072:2Eikpfs097Q/3qH6SD+npZxLG3Wv95HL2ezm7CPSoORUmN0k+4zPN8aRM1+8M+G+:2Eik197mVNG3G9107CPm7+4zV8B+8M4T
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 2628 Svchst.exe 2528 Svchst.exe 1660 Svchst.exe 1836 Svchst.exe 2328 Svchst.exe 2508 Svchst.exe 2076 Svchst.exe 3008 Svchst.exe 740 Svchst.exe 2268 Svchst.exe -
Loads dropped DLL 20 IoCs
pid Process 2652 d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe 2652 d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe 2628 Svchst.exe 2628 Svchst.exe 2528 Svchst.exe 2528 Svchst.exe 1660 Svchst.exe 1660 Svchst.exe 1836 Svchst.exe 1836 Svchst.exe 2328 Svchst.exe 2328 Svchst.exe 2508 Svchst.exe 2508 Svchst.exe 2076 Svchst.exe 2076 Svchst.exe 3008 Svchst.exe 3008 Svchst.exe 740 Svchst.exe 740 Svchst.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe File created C:\Windows\SysWOW64\Svchst.exe Svchst.exe File opened for modification C:\Windows\SysWOW64\Svchst.exe Svchst.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Svchst.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2628 2652 d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2628 2652 d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2628 2652 d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe 31 PID 2652 wrote to memory of 2628 2652 d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe 31 PID 2628 wrote to memory of 2528 2628 Svchst.exe 32 PID 2628 wrote to memory of 2528 2628 Svchst.exe 32 PID 2628 wrote to memory of 2528 2628 Svchst.exe 32 PID 2628 wrote to memory of 2528 2628 Svchst.exe 32 PID 2528 wrote to memory of 1660 2528 Svchst.exe 33 PID 2528 wrote to memory of 1660 2528 Svchst.exe 33 PID 2528 wrote to memory of 1660 2528 Svchst.exe 33 PID 2528 wrote to memory of 1660 2528 Svchst.exe 33 PID 1660 wrote to memory of 1836 1660 Svchst.exe 34 PID 1660 wrote to memory of 1836 1660 Svchst.exe 34 PID 1660 wrote to memory of 1836 1660 Svchst.exe 34 PID 1660 wrote to memory of 1836 1660 Svchst.exe 34 PID 1836 wrote to memory of 2328 1836 Svchst.exe 35 PID 1836 wrote to memory of 2328 1836 Svchst.exe 35 PID 1836 wrote to memory of 2328 1836 Svchst.exe 35 PID 1836 wrote to memory of 2328 1836 Svchst.exe 35 PID 2328 wrote to memory of 2508 2328 Svchst.exe 36 PID 2328 wrote to memory of 2508 2328 Svchst.exe 36 PID 2328 wrote to memory of 2508 2328 Svchst.exe 36 PID 2328 wrote to memory of 2508 2328 Svchst.exe 36 PID 2508 wrote to memory of 2076 2508 Svchst.exe 38 PID 2508 wrote to memory of 2076 2508 Svchst.exe 38 PID 2508 wrote to memory of 2076 2508 Svchst.exe 38 PID 2508 wrote to memory of 2076 2508 Svchst.exe 38 PID 2076 wrote to memory of 3008 2076 Svchst.exe 39 PID 2076 wrote to memory of 3008 2076 Svchst.exe 39 PID 2076 wrote to memory of 3008 2076 Svchst.exe 39 PID 2076 wrote to memory of 3008 2076 Svchst.exe 39 PID 3008 wrote to memory of 740 3008 Svchst.exe 40 PID 3008 wrote to memory of 740 3008 Svchst.exe 40 PID 3008 wrote to memory of 740 3008 Svchst.exe 40 PID 3008 wrote to memory of 740 3008 Svchst.exe 40 PID 740 wrote to memory of 2268 740 Svchst.exe 41 PID 740 wrote to memory of 2268 740 Svchst.exe 41 PID 740 wrote to memory of 2268 740 Svchst.exe 41 PID 740 wrote to memory of 2268 740 Svchst.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 464 "C:\Users\Admin\AppData\Local\Temp\d3ad4c380b0ddb12a8c5c257b2711d8c_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 516 "C:\Windows\SysWOW64\Svchst.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 520 "C:\Windows\SysWOW64\Svchst.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 532 "C:\Windows\SysWOW64\Svchst.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 524 "C:\Windows\SysWOW64\Svchst.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 536 "C:\Windows\SysWOW64\Svchst.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 528 "C:\Windows\SysWOW64\Svchst.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 540 "C:\Windows\SysWOW64\Svchst.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 552 "C:\Windows\SysWOW64\Svchst.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\SysWOW64\Svchst.exeC:\Windows\system32\Svchst.exe 544 "C:\Windows\SysWOW64\Svchst.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2268
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151KB
MD5d3ad4c380b0ddb12a8c5c257b2711d8c
SHA1e93ec344f3438f9f2ce2bf42525b8c7dbab12b17
SHA256e3b841147ca54c4dd61940fbbbbb9894d28a70a576f0c3f793dd9c70e5d22fe5
SHA512bee59270e5af3ec6c5c64ee2228508be1d113a825ea1e750ef54a9202286b7ed873eafdc1165c83bca7ce0852e1bcf8bd356006e0a5fea1d2dd3849209df467d