Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 00:23
Static task
static1
Behavioral task
behavioral1
Sample
f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe
-
Size
239KB
-
MD5
f66ac139d6c4ac033874fb1ff40fadc9
-
SHA1
78c74ad5dfff6929baa14db119b63e330f56db6f
-
SHA256
06b0feb0a8f8a27ba7f110230ad0e861fdb16c68a61d12b87c26e564d96575df
-
SHA512
db227edc213d1bd9b4c967f0550e2f9e13741a6988bf561717f4fcac735ba1edc43846f1300c0d1c61632c9933455efd9ea3437a365d7a3f0c6d2229b6b4b48d
-
SSDEEP
6144:pmobSO3LLHeqFRa5UbTyLwKTgtAivpmU0h0oZTZTZTZ:pmoOO3LDBI5UbTewJbvpx0h0o999
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 10 IoCs
pid Process 2472 msgsxplive.exe 2908 msgsxplive.exe 1028 msgsxplive.exe 2560 msgsxplive.exe 1252 msgsxplive.exe 3924 msgsxplive.exe 3776 msgsxplive.exe 4224 msgsxplive.exe 1288 msgsxplive.exe 3444 msgsxplive.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File created C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe File opened for modification C:\Windows\SysWOW64\msgsxplive.exe msgsxplive.exe -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msgsxplive.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3396 wrote to memory of 2472 3396 f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe 83 PID 3396 wrote to memory of 2472 3396 f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe 83 PID 3396 wrote to memory of 2472 3396 f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe 83 PID 2472 wrote to memory of 2908 2472 msgsxplive.exe 93 PID 2472 wrote to memory of 2908 2472 msgsxplive.exe 93 PID 2472 wrote to memory of 2908 2472 msgsxplive.exe 93 PID 2908 wrote to memory of 1028 2908 msgsxplive.exe 100 PID 2908 wrote to memory of 1028 2908 msgsxplive.exe 100 PID 2908 wrote to memory of 1028 2908 msgsxplive.exe 100 PID 1028 wrote to memory of 2560 1028 msgsxplive.exe 102 PID 1028 wrote to memory of 2560 1028 msgsxplive.exe 102 PID 1028 wrote to memory of 2560 1028 msgsxplive.exe 102 PID 2560 wrote to memory of 1252 2560 msgsxplive.exe 104 PID 2560 wrote to memory of 1252 2560 msgsxplive.exe 104 PID 2560 wrote to memory of 1252 2560 msgsxplive.exe 104 PID 1252 wrote to memory of 3924 1252 msgsxplive.exe 105 PID 1252 wrote to memory of 3924 1252 msgsxplive.exe 105 PID 1252 wrote to memory of 3924 1252 msgsxplive.exe 105 PID 3924 wrote to memory of 3776 3924 msgsxplive.exe 106 PID 3924 wrote to memory of 3776 3924 msgsxplive.exe 106 PID 3924 wrote to memory of 3776 3924 msgsxplive.exe 106 PID 3776 wrote to memory of 4224 3776 msgsxplive.exe 107 PID 3776 wrote to memory of 4224 3776 msgsxplive.exe 107 PID 3776 wrote to memory of 4224 3776 msgsxplive.exe 107 PID 4224 wrote to memory of 1288 4224 msgsxplive.exe 108 PID 4224 wrote to memory of 1288 4224 msgsxplive.exe 108 PID 4224 wrote to memory of 1288 4224 msgsxplive.exe 108 PID 1288 wrote to memory of 3444 1288 msgsxplive.exe 109 PID 1288 wrote to memory of 3444 1288 msgsxplive.exe 109 PID 1288 wrote to memory of 3444 1288 msgsxplive.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 1196 "C:\Users\Admin\AppData\Local\Temp\f66ac139d6c4ac033874fb1ff40fadc9_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 1152 "C:\Windows\SysWOW64\msgsxplive.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 1124 "C:\Windows\SysWOW64\msgsxplive.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 1092 "C:\Windows\SysWOW64\msgsxplive.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 1104 "C:\Windows\SysWOW64\msgsxplive.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 1128 "C:\Windows\SysWOW64\msgsxplive.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 1140 "C:\Windows\SysWOW64\msgsxplive.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 1148 "C:\Windows\SysWOW64\msgsxplive.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4224 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 1144 "C:\Windows\SysWOW64\msgsxplive.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\msgsxplive.exeC:\Windows\system32\msgsxplive.exe 1156 "C:\Windows\SysWOW64\msgsxplive.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3444
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5f66ac139d6c4ac033874fb1ff40fadc9
SHA178c74ad5dfff6929baa14db119b63e330f56db6f
SHA25606b0feb0a8f8a27ba7f110230ad0e861fdb16c68a61d12b87c26e564d96575df
SHA512db227edc213d1bd9b4c967f0550e2f9e13741a6988bf561717f4fcac735ba1edc43846f1300c0d1c61632c9933455efd9ea3437a365d7a3f0c6d2229b6b4b48d