Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14-12-2024 23:54
Static task
static1
Behavioral task
behavioral1
Sample
f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe
-
Size
286KB
-
MD5
f150fb7c56ae8edefd0a81539d661c4f
-
SHA1
c1c364da21f8b532cc52b2f7abc4d4099fa09938
-
SHA256
2e23ed0d7f505401da9928cd481478fe72a751a99fbf46d7abfe92f032a407de
-
SHA512
95aa74b0c886dd146c42313abb3a285d25eb1e0c3c6c3141a8feaf979e9ffa2a79588260f6fb6598a9ca442aba90620b1ae87f5d1f18c77a8f99773e53934a59
-
SSDEEP
3072:l2ulHM8xeHFGBlZXQ8AxHCe8qKViO7OaZpOBF7mB5Kvwz3z+radXg2yBrojcCyTG:l2MeMBlZXpUHLO7OGCdU8Iz3z5obd8
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 2340 wingate32.exe 2680 wingate32.exe 2596 wingate32.exe 1536 wingate32.exe 1764 wingate32.exe 2612 wingate32.exe 1636 wingate32.exe 2220 wingate32.exe 1032 wingate32.exe 612 wingate32.exe -
Loads dropped DLL 20 IoCs
pid Process 2360 f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe 2360 f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe 2340 wingate32.exe 2340 wingate32.exe 2680 wingate32.exe 2680 wingate32.exe 2596 wingate32.exe 2596 wingate32.exe 1536 wingate32.exe 1536 wingate32.exe 1764 wingate32.exe 1764 wingate32.exe 2612 wingate32.exe 2612 wingate32.exe 1636 wingate32.exe 1636 wingate32.exe 2220 wingate32.exe 2220 wingate32.exe 1032 wingate32.exe 1032 wingate32.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe File created C:\Windows\SysWOW64\wingate32.exe wingate32.exe File opened for modification C:\Windows\SysWOW64\wingate32.exe wingate32.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wingate32.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2340 2360 f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2340 2360 f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2340 2360 f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe 31 PID 2360 wrote to memory of 2340 2360 f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe 31 PID 2340 wrote to memory of 2680 2340 wingate32.exe 32 PID 2340 wrote to memory of 2680 2340 wingate32.exe 32 PID 2340 wrote to memory of 2680 2340 wingate32.exe 32 PID 2340 wrote to memory of 2680 2340 wingate32.exe 32 PID 2680 wrote to memory of 2596 2680 wingate32.exe 33 PID 2680 wrote to memory of 2596 2680 wingate32.exe 33 PID 2680 wrote to memory of 2596 2680 wingate32.exe 33 PID 2680 wrote to memory of 2596 2680 wingate32.exe 33 PID 2596 wrote to memory of 1536 2596 wingate32.exe 34 PID 2596 wrote to memory of 1536 2596 wingate32.exe 34 PID 2596 wrote to memory of 1536 2596 wingate32.exe 34 PID 2596 wrote to memory of 1536 2596 wingate32.exe 34 PID 1536 wrote to memory of 1764 1536 wingate32.exe 35 PID 1536 wrote to memory of 1764 1536 wingate32.exe 35 PID 1536 wrote to memory of 1764 1536 wingate32.exe 35 PID 1536 wrote to memory of 1764 1536 wingate32.exe 35 PID 1764 wrote to memory of 2612 1764 wingate32.exe 36 PID 1764 wrote to memory of 2612 1764 wingate32.exe 36 PID 1764 wrote to memory of 2612 1764 wingate32.exe 36 PID 1764 wrote to memory of 2612 1764 wingate32.exe 36 PID 2612 wrote to memory of 1636 2612 wingate32.exe 37 PID 2612 wrote to memory of 1636 2612 wingate32.exe 37 PID 2612 wrote to memory of 1636 2612 wingate32.exe 37 PID 2612 wrote to memory of 1636 2612 wingate32.exe 37 PID 1636 wrote to memory of 2220 1636 wingate32.exe 38 PID 1636 wrote to memory of 2220 1636 wingate32.exe 38 PID 1636 wrote to memory of 2220 1636 wingate32.exe 38 PID 1636 wrote to memory of 2220 1636 wingate32.exe 38 PID 2220 wrote to memory of 1032 2220 wingate32.exe 39 PID 2220 wrote to memory of 1032 2220 wingate32.exe 39 PID 2220 wrote to memory of 1032 2220 wingate32.exe 39 PID 2220 wrote to memory of 1032 2220 wingate32.exe 39 PID 1032 wrote to memory of 612 1032 wingate32.exe 40 PID 1032 wrote to memory of 612 1032 wingate32.exe 40 PID 1032 wrote to memory of 612 1032 wingate32.exe 40 PID 1032 wrote to memory of 612 1032 wingate32.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 480 "C:\Users\Admin\AppData\Local\Temp\f150fb7c56ae8edefd0a81539d661c4f_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 528 "C:\Windows\SysWOW64\wingate32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 532 "C:\Windows\SysWOW64\wingate32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 548 "C:\Windows\SysWOW64\wingate32.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 536 "C:\Windows\SysWOW64\wingate32.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 540 "C:\Windows\SysWOW64\wingate32.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 552 "C:\Windows\SysWOW64\wingate32.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 544 "C:\Windows\SysWOW64\wingate32.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 560 "C:\Windows\SysWOW64\wingate32.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\wingate32.exeC:\Windows\system32\wingate32.exe 556 "C:\Windows\SysWOW64\wingate32.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:612
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
286KB
MD5f150fb7c56ae8edefd0a81539d661c4f
SHA1c1c364da21f8b532cc52b2f7abc4d4099fa09938
SHA2562e23ed0d7f505401da9928cd481478fe72a751a99fbf46d7abfe92f032a407de
SHA51295aa74b0c886dd146c42313abb3a285d25eb1e0c3c6c3141a8feaf979e9ffa2a79588260f6fb6598a9ca442aba90620b1ae87f5d1f18c77a8f99773e53934a59