Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 15:11
Static task
static1
Behavioral task
behavioral1
Sample
ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe
-
Size
365KB
-
MD5
ec1a2d23f6ec819a7632b9d2d6c91362
-
SHA1
905e747b6d952ee409204539712acd38922aa3d3
-
SHA256
df33462acb9302bae07bb86056d1c577488a77263a09fd1935d2550891c32064
-
SHA512
d0ab5310273cc46a82eee0ca9dd6472ba641f041a81e9a160a4d2e796bd3584604d387cc73fb6bb8b6fc211ed7600735a0e71781b0c9643e5fdba634c2c936d8
-
SSDEEP
6144:xX2GVkaeqSnWxzYDIK/CvtSXQfM/c2BZu7SBJad21waqCkVKXU0F+R38HbqiByqL:xzkzHsK/AsQfM/lXEOad2elKX+tybqpK
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 20 IoCs
pid Process 2828 pr1nc.exe 2244 pr1nc.exe 952 pr1nc.exe 2024 pr1nc.exe 2192 pr1nc.exe 2284 pr1nc.exe 1336 pr1nc.exe 1372 pr1nc.exe 2968 pr1nc.exe 568 pr1nc.exe 2208 pr1nc.exe 2276 pr1nc.exe 2772 pr1nc.exe 3052 pr1nc.exe 1472 pr1nc.exe 1100 pr1nc.exe 2144 pr1nc.exe 1780 pr1nc.exe 440 pr1nc.exe 960 pr1nc.exe -
Loads dropped DLL 21 IoCs
pid Process 2528 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 2528 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 2828 pr1nc.exe 2244 pr1nc.exe 2244 pr1nc.exe 2024 pr1nc.exe 2024 pr1nc.exe 2284 pr1nc.exe 2284 pr1nc.exe 1372 pr1nc.exe 1372 pr1nc.exe 568 pr1nc.exe 568 pr1nc.exe 2276 pr1nc.exe 2276 pr1nc.exe 3052 pr1nc.exe 3052 pr1nc.exe 1100 pr1nc.exe 1100 pr1nc.exe 1780 pr1nc.exe 1780 pr1nc.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File opened for modification C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File created C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File created C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File created C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File opened for modification C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File opened for modification C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File opened for modification C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File created C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File created C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File opened for modification C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File created C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File opened for modification C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File created C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File opened for modification C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File opened for modification C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File created C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File opened for modification C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File created C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe File created C:\Windows\SysWOW64\pr1nc.exe ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\pr1nc.exe ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe File created C:\Windows\SysWOW64\pr1nc.exe pr1nc.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2492 set thread context of 2528 2492 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 31 PID 2828 set thread context of 2244 2828 pr1nc.exe 33 PID 952 set thread context of 2024 952 pr1nc.exe 36 PID 2192 set thread context of 2284 2192 pr1nc.exe 38 PID 1336 set thread context of 1372 1336 pr1nc.exe 40 PID 2968 set thread context of 568 2968 pr1nc.exe 42 PID 2208 set thread context of 2276 2208 pr1nc.exe 44 PID 2772 set thread context of 3052 2772 pr1nc.exe 46 PID 1472 set thread context of 1100 1472 pr1nc.exe 48 PID 2144 set thread context of 1780 2144 pr1nc.exe 50 PID 440 set thread context of 960 440 pr1nc.exe 52 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pr1nc.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2492 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 2828 pr1nc.exe 952 pr1nc.exe 2192 pr1nc.exe 1336 pr1nc.exe 2968 pr1nc.exe 2208 pr1nc.exe 2772 pr1nc.exe 1472 pr1nc.exe 2144 pr1nc.exe 440 pr1nc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2492 wrote to memory of 2528 2492 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2528 2492 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2528 2492 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2528 2492 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2528 2492 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2528 2492 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2528 2492 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2528 2492 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2528 2492 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2528 2492 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2528 2492 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 31 PID 2492 wrote to memory of 2528 2492 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 31 PID 2528 wrote to memory of 2828 2528 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 32 PID 2528 wrote to memory of 2828 2528 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 32 PID 2528 wrote to memory of 2828 2528 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 32 PID 2528 wrote to memory of 2828 2528 ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe 32 PID 2828 wrote to memory of 2244 2828 pr1nc.exe 33 PID 2828 wrote to memory of 2244 2828 pr1nc.exe 33 PID 2828 wrote to memory of 2244 2828 pr1nc.exe 33 PID 2828 wrote to memory of 2244 2828 pr1nc.exe 33 PID 2828 wrote to memory of 2244 2828 pr1nc.exe 33 PID 2828 wrote to memory of 2244 2828 pr1nc.exe 33 PID 2828 wrote to memory of 2244 2828 pr1nc.exe 33 PID 2828 wrote to memory of 2244 2828 pr1nc.exe 33 PID 2828 wrote to memory of 2244 2828 pr1nc.exe 33 PID 2828 wrote to memory of 2244 2828 pr1nc.exe 33 PID 2828 wrote to memory of 2244 2828 pr1nc.exe 33 PID 2828 wrote to memory of 2244 2828 pr1nc.exe 33 PID 2244 wrote to memory of 952 2244 pr1nc.exe 35 PID 2244 wrote to memory of 952 2244 pr1nc.exe 35 PID 2244 wrote to memory of 952 2244 pr1nc.exe 35 PID 2244 wrote to memory of 952 2244 pr1nc.exe 35 PID 952 wrote to memory of 2024 952 pr1nc.exe 36 PID 952 wrote to memory of 2024 952 pr1nc.exe 36 PID 952 wrote to memory of 2024 952 pr1nc.exe 36 PID 952 wrote to memory of 2024 952 pr1nc.exe 36 PID 952 wrote to memory of 2024 952 pr1nc.exe 36 PID 952 wrote to memory of 2024 952 pr1nc.exe 36 PID 952 wrote to memory of 2024 952 pr1nc.exe 36 PID 952 wrote to memory of 2024 952 pr1nc.exe 36 PID 952 wrote to memory of 2024 952 pr1nc.exe 36 PID 952 wrote to memory of 2024 952 pr1nc.exe 36 PID 952 wrote to memory of 2024 952 pr1nc.exe 36 PID 952 wrote to memory of 2024 952 pr1nc.exe 36 PID 2024 wrote to memory of 2192 2024 pr1nc.exe 37 PID 2024 wrote to memory of 2192 2024 pr1nc.exe 37 PID 2024 wrote to memory of 2192 2024 pr1nc.exe 37 PID 2024 wrote to memory of 2192 2024 pr1nc.exe 37 PID 2192 wrote to memory of 2284 2192 pr1nc.exe 38 PID 2192 wrote to memory of 2284 2192 pr1nc.exe 38 PID 2192 wrote to memory of 2284 2192 pr1nc.exe 38 PID 2192 wrote to memory of 2284 2192 pr1nc.exe 38 PID 2192 wrote to memory of 2284 2192 pr1nc.exe 38 PID 2192 wrote to memory of 2284 2192 pr1nc.exe 38 PID 2192 wrote to memory of 2284 2192 pr1nc.exe 38 PID 2192 wrote to memory of 2284 2192 pr1nc.exe 38 PID 2192 wrote to memory of 2284 2192 pr1nc.exe 38 PID 2192 wrote to memory of 2284 2192 pr1nc.exe 38 PID 2192 wrote to memory of 2284 2192 pr1nc.exe 38 PID 2192 wrote to memory of 2284 2192 pr1nc.exe 38 PID 2284 wrote to memory of 1336 2284 pr1nc.exe 39 PID 2284 wrote to memory of 1336 2284 pr1nc.exe 39 PID 2284 wrote to memory of 1336 2284 pr1nc.exe 39 PID 2284 wrote to memory of 1336 2284 pr1nc.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\system32\pr1nc.exe 452 "C:\Users\Admin\AppData\Local\Temp\ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\SysWOW64\pr1nc.exe 452 "C:\Users\Admin\AppData\Local\Temp\ec1a2d23f6ec819a7632b9d2d6c91362_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\system32\pr1nc.exe 516 "C:\Windows\SysWOW64\pr1nc.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\SysWOW64\pr1nc.exe 516 "C:\Windows\SysWOW64\pr1nc.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\system32\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\SysWOW64\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\system32\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1336 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\SysWOW64\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1372 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\system32\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\SysWOW64\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:568 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\system32\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\SysWOW64\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\system32\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\SysWOW64\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\system32\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1472 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\SysWOW64\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1100 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\system32\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\SysWOW64\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\system32\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:440 -
C:\Windows\SysWOW64\pr1nc.exeC:\Windows\SysWOW64\pr1nc.exe 524 "C:\Windows\SysWOW64\pr1nc.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:960
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365KB
MD5ec1a2d23f6ec819a7632b9d2d6c91362
SHA1905e747b6d952ee409204539712acd38922aa3d3
SHA256df33462acb9302bae07bb86056d1c577488a77263a09fd1935d2550891c32064
SHA512d0ab5310273cc46a82eee0ca9dd6472ba641f041a81e9a160a4d2e796bd3584604d387cc73fb6bb8b6fc211ed7600735a0e71781b0c9643e5fdba634c2c936d8