Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 09:08
Static task
static1
Behavioral task
behavioral1
Sample
e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe
-
Size
283KB
-
MD5
e5ac5c4d432b5a1ec4b1a2920a148abf
-
SHA1
eb98c6c332fc45ff5a6332f4bde69297662230d0
-
SHA256
eebab36d5147c2a87ef6cb03dca876a72a6cc5a5fb7fd3b5b081163bfb2b3a2e
-
SHA512
c0d888790f43b8f690a65f82002d6af6c212ff03737a083498926b7530dfa57e48830cd72b3a113fc3b2fdd0abdabb3cf0c8ea75da262998a6c8ad95d105e3d5
-
SSDEEP
3072:02ulHM8xeHFGBlZXQ8AxHCe8qKViO7OaZpOBF7mB5Kvwz3z+radXq2yBrojcCyTG:02MeMBlZXpUHLO7OGCdU8Iz3zPobd8
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 2836 wingate32.exe 2880 wingate32.exe 1300 wingate32.exe 2460 wingate32.exe 2900 wingate32.exe 2276 wingate32.exe 2132 wingate32.exe 316 wingate32.exe 1628 wingate32.exe 1772 wingate32.exe -
Loads dropped DLL 20 IoCs
pid Process 2224 e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe 2224 e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe 2836 wingate32.exe 2836 wingate32.exe 2880 wingate32.exe 2880 wingate32.exe 1300 wingate32.exe 1300 wingate32.exe 2460 wingate32.exe 2460 wingate32.exe 2900 wingate32.exe 2900 wingate32.exe 2276 wingate32.exe 2276 wingate32.exe 2132 wingate32.exe 2132 wingate32.exe 316 wingate32.exe 316 wingate32.exe 1628 wingate32.exe 1628 wingate32.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2836 2224 e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2836 2224 e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2836 2224 e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe 31 PID 2224 wrote to memory of 2836 2224 e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe 31 PID 2836 wrote to memory of 2880 2836 wingate32.exe 32 PID 2836 wrote to memory of 2880 2836 wingate32.exe 32 PID 2836 wrote to memory of 2880 2836 wingate32.exe 32 PID 2836 wrote to memory of 2880 2836 wingate32.exe 32 PID 2880 wrote to memory of 1300 2880 wingate32.exe 33 PID 2880 wrote to memory of 1300 2880 wingate32.exe 33 PID 2880 wrote to memory of 1300 2880 wingate32.exe 33 PID 2880 wrote to memory of 1300 2880 wingate32.exe 33 PID 1300 wrote to memory of 2460 1300 wingate32.exe 34 PID 1300 wrote to memory of 2460 1300 wingate32.exe 34 PID 1300 wrote to memory of 2460 1300 wingate32.exe 34 PID 1300 wrote to memory of 2460 1300 wingate32.exe 34 PID 2460 wrote to memory of 2900 2460 wingate32.exe 35 PID 2460 wrote to memory of 2900 2460 wingate32.exe 35 PID 2460 wrote to memory of 2900 2460 wingate32.exe 35 PID 2460 wrote to memory of 2900 2460 wingate32.exe 35 PID 2900 wrote to memory of 2276 2900 wingate32.exe 37 PID 2900 wrote to memory of 2276 2900 wingate32.exe 37 PID 2900 wrote to memory of 2276 2900 wingate32.exe 37 PID 2900 wrote to memory of 2276 2900 wingate32.exe 37 PID 2276 wrote to memory of 2132 2276 wingate32.exe 38 PID 2276 wrote to memory of 2132 2276 wingate32.exe 38 PID 2276 wrote to memory of 2132 2276 wingate32.exe 38 PID 2276 wrote to memory of 2132 2276 wingate32.exe 38 PID 2132 wrote to memory of 316 2132 wingate32.exe 39 PID 2132 wrote to memory of 316 2132 wingate32.exe 39 PID 2132 wrote to memory of 316 2132 wingate32.exe 39 PID 2132 wrote to memory of 316 2132 wingate32.exe 39 PID 316 wrote to memory of 1628 316 wingate32.exe 40 PID 316 wrote to memory of 1628 316 wingate32.exe 40 PID 316 wrote to memory of 1628 316 wingate32.exe 40 PID 316 wrote to memory of 1628 316 wingate32.exe 40 PID 1628 wrote to memory of 1772 1628 wingate32.exe 41 PID 1628 wrote to memory of 1772 1628 wingate32.exe 41 PID 1628 wrote to memory of 1772 1628 wingate32.exe 41 PID 1628 wrote to memory of 1772 1628 wingate32.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 476 "C:\Users\Admin\AppData\Local\Temp\e5ac5c4d432b5a1ec4b1a2920a148abf_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 528 "C:\Windows\SysWOW64\wingate32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 532 "C:\Windows\SysWOW64\wingate32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 536 "C:\Windows\SysWOW64\wingate32.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 540 "C:\Windows\SysWOW64\wingate32.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 544 "C:\Windows\SysWOW64\wingate32.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 548 "C:\Windows\SysWOW64\wingate32.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 556 "C:\Windows\SysWOW64\wingate32.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 560 "C:\Windows\SysWOW64\wingate32.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 552 "C:\Windows\SysWOW64\wingate32.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1772
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
283KB
MD5e5ac5c4d432b5a1ec4b1a2920a148abf
SHA1eb98c6c332fc45ff5a6332f4bde69297662230d0
SHA256eebab36d5147c2a87ef6cb03dca876a72a6cc5a5fb7fd3b5b081163bfb2b3a2e
SHA512c0d888790f43b8f690a65f82002d6af6c212ff03737a083498926b7530dfa57e48830cd72b3a113fc3b2fdd0abdabb3cf0c8ea75da262998a6c8ad95d105e3d5