Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
15-12-2024 12:11
Static task
static1
Behavioral task
behavioral1
Sample
f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe
-
Size
32KB
-
MD5
f3f025de4af900300b7070b63980b4ff
-
SHA1
39416f80cbe54d641e8533e005264f2fd1b85f25
-
SHA256
019029d03d9726f5ba3206f0e4aae9414c7d301dd9d8fbe4527e3b5e609abb0c
-
SHA512
33cd7169ac34cc7e482872c497fabb4d98452f96f1a3919aa62f1831ce9b96268fd1dddeb23b7817b33c2b58b84cd99bcca4a8220909e1180ed66d25f0b3f668
-
SSDEEP
768:XTlZgICDGYpAMir1e3lOfXOp5KEEK7Hg7iqaATldPi7Nd/naITaVXJKD8y06xByL:jlZgICjyk1OfXOp5XEK7Hg7i+Tbi7j/k
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2724 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2000 pic.exe -
Loads dropped DLL 4 IoCs
pid Process 524 f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe 524 f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe 524 f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe 524 f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\wxptdi.sys pic.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2000 set thread context of 2468 2000 pic.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language pic.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2000 pic.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 524 wrote to memory of 2000 524 f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe 31 PID 524 wrote to memory of 2000 524 f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe 31 PID 524 wrote to memory of 2000 524 f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe 31 PID 524 wrote to memory of 2000 524 f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe 31 PID 524 wrote to memory of 2724 524 f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe 32 PID 524 wrote to memory of 2724 524 f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe 32 PID 524 wrote to memory of 2724 524 f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe 32 PID 524 wrote to memory of 2724 524 f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe 32 PID 2000 wrote to memory of 2468 2000 pic.exe 34 PID 2000 wrote to memory of 2468 2000 pic.exe 34 PID 2000 wrote to memory of 2468 2000 pic.exe 34 PID 2000 wrote to memory of 2468 2000 pic.exe 34 PID 2000 wrote to memory of 2468 2000 pic.exe 34 PID 2000 wrote to memory of 2468 2000 pic.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\pic.exe"C:\Users\Admin\AppData\Local\Temp\pic.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\svchost.exeC:\Users\Admin\AppData\Local\Temp\pic.exe3⤵PID:2468
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OPEE2A3.bat" "" "C:\Users\Admin\AppData\Local\Temp" "f3f025de4af900300b7070b63980b4ff_JaffaCakes118.exe""2⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2724
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44B
MD5bd72f632464c3ff2f5a20870b59aa27b
SHA14bbb3d50ec61ce9adebf98a3c8f7a0bbe960a684
SHA2569ddaf09d8002847f4ab98a3e2f50730aa4a6950815aeef1ec55bae5482afb0f4
SHA51212295684b9c54f7a3a55c60be888941124072c864f1b52f438bfc04a929ba1e6add8a088f06d3812591a2441ec3409584a72d96f2dd8ebd47c7a7fce51443676
-
Filesize
30KB
MD5702d3be877923dc28fdce8931775b7ae
SHA18223a86a9feb77aded9834f4959b020f0ee43823
SHA25686317e3059cfe0c1252d9d7ddfa6999ccba1aebab0a6c3e81d28fe7edd9986f7
SHA51292ec7bd649d7609c8aa671697cbd467e108a0db84cbf2730b1094cf9e307fd53e304a3e8d849f48b176f426991455eef144946cf803ccfee170ed46fe698f68d