Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10-12-2024 02:21
Static task
static1
Behavioral task
behavioral1
Sample
dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe
-
Size
246KB
-
MD5
dc92ff4f166d38b6abeac80b5cc9af9c
-
SHA1
5afa2679d052c95f216f23815d683e3eb54abb09
-
SHA256
e1d20275cba70c2ea30ac11d76c96197ac5bcf192c85b9986ca3b496eb79caf5
-
SHA512
cace0022a05005531378d5f26ff1003fa543a301e63f053fcd756ab59dbf77798b0d149d2292b0f240b5a693ca94fabdb421f2a5fdb0c57383bd79887eab60bc
-
SSDEEP
6144:shvcSsx+K+v1AwmkRXcaSacztIvPAAivpmU0b6:sBZs0KYAwXcWscobvpx0
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 1340 msnlive.exe 4268 msnlive.exe 4800 msnlive.exe 1404 msnlive.exe 3232 msnlive.exe 4484 msnlive.exe 1540 msnlive.exe 3740 msnlive.exe 1160 msnlive.exe 3592 msnlive.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msnlive.exe msnlive.exe File opened for modification C:\Windows\SysWOW64\msnlive.exe msnlive.exe File created C:\Windows\SysWOW64\msnlive.exe msnlive.exe File opened for modification C:\Windows\SysWOW64\msnlive.exe msnlive.exe File created C:\Windows\SysWOW64\msnlive.exe dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msnlive.exe dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msnlive.exe msnlive.exe File created C:\Windows\SysWOW64\msnlive.exe msnlive.exe File opened for modification C:\Windows\SysWOW64\msnlive.exe msnlive.exe File opened for modification C:\Windows\SysWOW64\msnlive.exe msnlive.exe File created C:\Windows\SysWOW64\msnlive.exe msnlive.exe File created C:\Windows\SysWOW64\msnlive.exe msnlive.exe File opened for modification C:\Windows\SysWOW64\msnlive.exe msnlive.exe File opened for modification C:\Windows\SysWOW64\msnlive.exe msnlive.exe File opened for modification C:\Windows\SysWOW64\msnlive.exe msnlive.exe File created C:\Windows\SysWOW64\msnlive.exe msnlive.exe File opened for modification C:\Windows\SysWOW64\msnlive.exe msnlive.exe File created C:\Windows\SysWOW64\msnlive.exe msnlive.exe File created C:\Windows\SysWOW64\msnlive.exe msnlive.exe File created C:\Windows\SysWOW64\msnlive.exe msnlive.exe File created C:\Windows\SysWOW64\msnlive.exe msnlive.exe File created C:\Windows\SysWOW64\msnlive.exe msnlive.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnlive.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 428 wrote to memory of 1340 428 dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe 83 PID 428 wrote to memory of 1340 428 dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe 83 PID 428 wrote to memory of 1340 428 dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe 83 PID 1340 wrote to memory of 4268 1340 msnlive.exe 92 PID 1340 wrote to memory of 4268 1340 msnlive.exe 92 PID 1340 wrote to memory of 4268 1340 msnlive.exe 92 PID 4268 wrote to memory of 4800 4268 msnlive.exe 99 PID 4268 wrote to memory of 4800 4268 msnlive.exe 99 PID 4268 wrote to memory of 4800 4268 msnlive.exe 99 PID 4800 wrote to memory of 1404 4800 msnlive.exe 101 PID 4800 wrote to memory of 1404 4800 msnlive.exe 101 PID 4800 wrote to memory of 1404 4800 msnlive.exe 101 PID 1404 wrote to memory of 3232 1404 msnlive.exe 102 PID 1404 wrote to memory of 3232 1404 msnlive.exe 102 PID 1404 wrote to memory of 3232 1404 msnlive.exe 102 PID 3232 wrote to memory of 4484 3232 msnlive.exe 103 PID 3232 wrote to memory of 4484 3232 msnlive.exe 103 PID 3232 wrote to memory of 4484 3232 msnlive.exe 103 PID 4484 wrote to memory of 1540 4484 msnlive.exe 104 PID 4484 wrote to memory of 1540 4484 msnlive.exe 104 PID 4484 wrote to memory of 1540 4484 msnlive.exe 104 PID 1540 wrote to memory of 3740 1540 msnlive.exe 105 PID 1540 wrote to memory of 3740 1540 msnlive.exe 105 PID 1540 wrote to memory of 3740 1540 msnlive.exe 105 PID 3740 wrote to memory of 1160 3740 msnlive.exe 106 PID 3740 wrote to memory of 1160 3740 msnlive.exe 106 PID 3740 wrote to memory of 1160 3740 msnlive.exe 106 PID 1160 wrote to memory of 3592 1160 msnlive.exe 107 PID 1160 wrote to memory of 3592 1160 msnlive.exe 107 PID 1160 wrote to memory of 3592 1160 msnlive.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\SysWOW64\msnlive.exeC:\Windows\system32\msnlive.exe 1036 "C:\Users\Admin\AppData\Local\Temp\dc92ff4f166d38b6abeac80b5cc9af9c_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\msnlive.exeC:\Windows\system32\msnlive.exe 1156 "C:\Windows\SysWOW64\msnlive.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\msnlive.exeC:\Windows\system32\msnlive.exe 1128 "C:\Windows\SysWOW64\msnlive.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Windows\SysWOW64\msnlive.exeC:\Windows\system32\msnlive.exe 1132 "C:\Windows\SysWOW64\msnlive.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\msnlive.exeC:\Windows\system32\msnlive.exe 1136 "C:\Windows\SysWOW64\msnlive.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3232 -
C:\Windows\SysWOW64\msnlive.exeC:\Windows\system32\msnlive.exe 1140 "C:\Windows\SysWOW64\msnlive.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\SysWOW64\msnlive.exeC:\Windows\system32\msnlive.exe 1124 "C:\Windows\SysWOW64\msnlive.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\SysWOW64\msnlive.exeC:\Windows\system32\msnlive.exe 1120 "C:\Windows\SysWOW64\msnlive.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\SysWOW64\msnlive.exeC:\Windows\system32\msnlive.exe 1068 "C:\Windows\SysWOW64\msnlive.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\msnlive.exeC:\Windows\system32\msnlive.exe 1164 "C:\Windows\SysWOW64\msnlive.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3592
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
246KB
MD5dc92ff4f166d38b6abeac80b5cc9af9c
SHA15afa2679d052c95f216f23815d683e3eb54abb09
SHA256e1d20275cba70c2ea30ac11d76c96197ac5bcf192c85b9986ca3b496eb79caf5
SHA512cace0022a05005531378d5f26ff1003fa543a301e63f053fcd756ab59dbf77798b0d149d2292b0f240b5a693ca94fabdb421f2a5fdb0c57383bd79887eab60bc