Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16/12/2024, 00:23
Static task
static1
Behavioral task
behavioral1
Sample
f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe
-
Size
239KB
-
MD5
f66ac139d6c4ac033874fb1ff40fadc9
-
SHA1
78c74ad5dfff6929baa14db119b63e330f56db6f
-
SHA256
06b0feb0a8f8a27ba7f110230ad0e861fdb16c68a61d12b87c26e564d96575df
-
SHA512
db227edc213d1bd9b4c967f0550e2f9e13741a6988bf561717f4fcac735ba1edc43846f1300c0d1c61632c9933455efd9ea3437a365d7a3f0c6d2229b6b4b48d
-
SSDEEP
6144:pmobSO3LLHeqFRa5UbTyLwKTgtAivpmU0h0oZTZTZTZ:pmoOO3LDBI5UbTewJbvpx0h0o999
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 2444 msgsxplive.exe 2508 msgsxplive.exe 1936 msgsxplive.exe 828 msgsxplive.exe 2800 msgsxplive.exe 324 msgsxplive.exe 1508 msgsxplive.exe 2004 msgsxplive.exe 2916 msgsxplive.exe 1640 msgsxplive.exe -
Loads dropped DLL 20 IoCs
pid Process 1044 f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe 1044 f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe 2444 msgsxplive.exe 2444 msgsxplive.exe 2508 msgsxplive.exe 2508 msgsxplive.exe 1936 msgsxplive.exe 1936 msgsxplive.exe 828 msgsxplive.exe 828 msgsxplive.exe 2800 msgsxplive.exe 2800 msgsxplive.exe 324 msgsxplive.exe 324 msgsxplive.exe 1508 msgsxplive.exe 1508 msgsxplive.exe 2004 msgsxplive.exe 2004 msgsxplive.exe 2916 msgsxplive.exe 2916 msgsxplive.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\msgsxplive.exe f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe -
Suspicious use of WriteProcessMemory 40 IoCs
description pid Process procid_target PID 1044 wrote to memory of 2444 1044 f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2444 1044 f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2444 1044 f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe 28 PID 1044 wrote to memory of 2444 1044 f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe 28 PID 2444 wrote to memory of 2508 2444 msgsxplive.exe 29 PID 2444 wrote to memory of 2508 2444 msgsxplive.exe 29 PID 2444 wrote to memory of 2508 2444 msgsxplive.exe 29 PID 2444 wrote to memory of 2508 2444 msgsxplive.exe 29 PID 2508 wrote to memory of 1936 2508 msgsxplive.exe 32 PID 2508 wrote to memory of 1936 2508 msgsxplive.exe 32 PID 2508 wrote to memory of 1936 2508 msgsxplive.exe 32 PID 2508 wrote to memory of 1936 2508 msgsxplive.exe 32 PID 1936 wrote to memory of 828 1936 msgsxplive.exe 33 PID 1936 wrote to memory of 828 1936 msgsxplive.exe 33 PID 1936 wrote to memory of 828 1936 msgsxplive.exe 33 PID 1936 wrote to memory of 828 1936 msgsxplive.exe 33 PID 828 wrote to memory of 2800 828 msgsxplive.exe 34 PID 828 wrote to memory of 2800 828 msgsxplive.exe 34 PID 828 wrote to memory of 2800 828 msgsxplive.exe 34 PID 828 wrote to memory of 2800 828 msgsxplive.exe 34 PID 2800 wrote to memory of 324 2800 msgsxplive.exe 35 PID 2800 wrote to memory of 324 2800 msgsxplive.exe 35 PID 2800 wrote to memory of 324 2800 msgsxplive.exe 35 PID 2800 wrote to memory of 324 2800 msgsxplive.exe 35 PID 324 wrote to memory of 1508 324 msgsxplive.exe 36 PID 324 wrote to memory of 1508 324 msgsxplive.exe 36 PID 324 wrote to memory of 1508 324 msgsxplive.exe 36 PID 324 wrote to memory of 1508 324 msgsxplive.exe 36 PID 1508 wrote to memory of 2004 1508 msgsxplive.exe 37 PID 1508 wrote to memory of 2004 1508 msgsxplive.exe 37 PID 1508 wrote to memory of 2004 1508 msgsxplive.exe 37 PID 1508 wrote to memory of 2004 1508 msgsxplive.exe 37 PID 2004 wrote to memory of 2916 2004 msgsxplive.exe 38 PID 2004 wrote to memory of 2916 2004 msgsxplive.exe 38 PID 2004 wrote to memory of 2916 2004 msgsxplive.exe 38 PID 2004 wrote to memory of 2916 2004 msgsxplive.exe 38 PID 2916 wrote to memory of 1640 2916 msgsxplive.exe 39 PID 2916 wrote to memory of 1640 2916 msgsxplive.exe 39 PID 2916 wrote to memory of 1640 2916 msgsxplive.exe 39 PID 2916 wrote to memory of 1640 2916 msgsxplive.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 544 "C:\Users\Admin\AppData\Local\Temp\f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 536 "C:\Windows\SysWOW64\msgsxplive.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 552 "C:\Windows\SysWOW64\msgsxplive.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 528 "C:\Windows\SysWOW64\msgsxplive.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 560 "C:\Windows\SysWOW64\msgsxplive.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 540 "C:\Windows\SysWOW64\msgsxplive.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 556 "C:\Windows\SysWOW64\msgsxplive.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 548 "C:\Windows\SysWOW64\msgsxplive.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 568 "C:\Windows\SysWOW64\msgsxplive.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 532 "C:\Windows\SysWOW64\msgsxplive.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1640
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5f66ac139d6c4ac033874fb1ff40fadc9
SHA178c74ad5dfff6929baa14db119b63e330f56db6f
SHA25606b0feb0a8f8a27ba7f110230ad0e861fdb16c68a61d12b87c26e564d96575df
SHA512db227edc213d1bd9b4c967f0550e2f9e13741a6988bf561717f4fcac735ba1edc43846f1300c0d1c61632c9933455efd9ea3437a365d7a3f0c6d2229b6b4b48d