Analysis
-
max time kernel
143s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe
-
Size
608KB
-
MD5
8993c57cdf870273d2bbba40f93a3709
-
SHA1
c161a3b871b97e094794d57b9f5fbef2235473dd
-
SHA256
2f01c83de89e09d19fec0a34610e1e4e08f97d1d63994971290a58f5843d6c3a
-
SHA512
cda4bdbe76dd561663d918cc87abfcb7d0071f7d8dbb448826369cfc0421aa5c946576f119a39b86c6c7a2c588ab41e8b3322fde73aa8558f21fde8f97c814c8
-
SSDEEP
12288:TiZGqXOv0AcArZ+zTf3qalh0CYdxIK4h5kfZh1UyknblgoqTSBE:TasebTOHIK4h5kR3Uh5qoE
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 20 IoCs
pid Process 2624 yahoo.exe 2756 yahoo.exe 1996 yahoo.exe 2276 yahoo.exe 1636 yahoo.exe 2184 yahoo.exe 2412 yahoo.exe 288 yahoo.exe 2308 yahoo.exe 2936 yahoo.exe 2136 yahoo.exe 1524 yahoo.exe 2964 yahoo.exe 2244 yahoo.exe 1952 yahoo.exe 1520 yahoo.exe 1932 yahoo.exe 2200 yahoo.exe 924 yahoo.exe 2120 yahoo.exe -
Loads dropped DLL 21 IoCs
pid Process 2652 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 2652 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 2624 yahoo.exe 2756 yahoo.exe 2756 yahoo.exe 2276 yahoo.exe 2276 yahoo.exe 2184 yahoo.exe 2184 yahoo.exe 288 yahoo.exe 288 yahoo.exe 2936 yahoo.exe 2936 yahoo.exe 1524 yahoo.exe 1524 yahoo.exe 2244 yahoo.exe 2244 yahoo.exe 1520 yahoo.exe 1520 yahoo.exe 2200 yahoo.exe 2200 yahoo.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\yahoo.exe JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2780 set thread context of 2652 2780 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 31 PID 2624 set thread context of 2756 2624 yahoo.exe 33 PID 1996 set thread context of 2276 1996 yahoo.exe 35 PID 1636 set thread context of 2184 1636 yahoo.exe 37 PID 2412 set thread context of 288 2412 yahoo.exe 39 PID 2308 set thread context of 2936 2308 yahoo.exe 41 PID 2136 set thread context of 1524 2136 yahoo.exe 43 PID 2964 set thread context of 2244 2964 yahoo.exe 45 PID 1952 set thread context of 1520 1952 yahoo.exe 48 PID 1932 set thread context of 2200 1932 yahoo.exe 50 PID 924 set thread context of 2120 924 yahoo.exe 52 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 2780 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 2624 yahoo.exe 1996 yahoo.exe 1636 yahoo.exe 2412 yahoo.exe 2308 yahoo.exe 2136 yahoo.exe 2964 yahoo.exe 1952 yahoo.exe 1932 yahoo.exe 924 yahoo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2652 2780 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 31 PID 2780 wrote to memory of 2652 2780 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 31 PID 2780 wrote to memory of 2652 2780 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 31 PID 2780 wrote to memory of 2652 2780 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 31 PID 2780 wrote to memory of 2652 2780 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 31 PID 2780 wrote to memory of 2652 2780 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 31 PID 2780 wrote to memory of 2652 2780 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 31 PID 2780 wrote to memory of 2652 2780 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 31 PID 2780 wrote to memory of 2652 2780 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 31 PID 2780 wrote to memory of 2652 2780 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 31 PID 2780 wrote to memory of 2652 2780 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 31 PID 2780 wrote to memory of 2652 2780 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 31 PID 2652 wrote to memory of 2624 2652 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 32 PID 2652 wrote to memory of 2624 2652 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 32 PID 2652 wrote to memory of 2624 2652 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 32 PID 2652 wrote to memory of 2624 2652 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 32 PID 2624 wrote to memory of 2756 2624 yahoo.exe 33 PID 2624 wrote to memory of 2756 2624 yahoo.exe 33 PID 2624 wrote to memory of 2756 2624 yahoo.exe 33 PID 2624 wrote to memory of 2756 2624 yahoo.exe 33 PID 2624 wrote to memory of 2756 2624 yahoo.exe 33 PID 2624 wrote to memory of 2756 2624 yahoo.exe 33 PID 2624 wrote to memory of 2756 2624 yahoo.exe 33 PID 2624 wrote to memory of 2756 2624 yahoo.exe 33 PID 2624 wrote to memory of 2756 2624 yahoo.exe 33 PID 2624 wrote to memory of 2756 2624 yahoo.exe 33 PID 2624 wrote to memory of 2756 2624 yahoo.exe 33 PID 2624 wrote to memory of 2756 2624 yahoo.exe 33 PID 2756 wrote to memory of 1996 2756 yahoo.exe 34 PID 2756 wrote to memory of 1996 2756 yahoo.exe 34 PID 2756 wrote to memory of 1996 2756 yahoo.exe 34 PID 2756 wrote to memory of 1996 2756 yahoo.exe 34 PID 1996 wrote to memory of 2276 1996 yahoo.exe 35 PID 1996 wrote to memory of 2276 1996 yahoo.exe 35 PID 1996 wrote to memory of 2276 1996 yahoo.exe 35 PID 1996 wrote to memory of 2276 1996 yahoo.exe 35 PID 1996 wrote to memory of 2276 1996 yahoo.exe 35 PID 1996 wrote to memory of 2276 1996 yahoo.exe 35 PID 1996 wrote to memory of 2276 1996 yahoo.exe 35 PID 1996 wrote to memory of 2276 1996 yahoo.exe 35 PID 1996 wrote to memory of 2276 1996 yahoo.exe 35 PID 1996 wrote to memory of 2276 1996 yahoo.exe 35 PID 1996 wrote to memory of 2276 1996 yahoo.exe 35 PID 1996 wrote to memory of 2276 1996 yahoo.exe 35 PID 2276 wrote to memory of 1636 2276 yahoo.exe 36 PID 2276 wrote to memory of 1636 2276 yahoo.exe 36 PID 2276 wrote to memory of 1636 2276 yahoo.exe 36 PID 2276 wrote to memory of 1636 2276 yahoo.exe 36 PID 1636 wrote to memory of 2184 1636 yahoo.exe 37 PID 1636 wrote to memory of 2184 1636 yahoo.exe 37 PID 1636 wrote to memory of 2184 1636 yahoo.exe 37 PID 1636 wrote to memory of 2184 1636 yahoo.exe 37 PID 1636 wrote to memory of 2184 1636 yahoo.exe 37 PID 1636 wrote to memory of 2184 1636 yahoo.exe 37 PID 1636 wrote to memory of 2184 1636 yahoo.exe 37 PID 1636 wrote to memory of 2184 1636 yahoo.exe 37 PID 1636 wrote to memory of 2184 1636 yahoo.exe 37 PID 1636 wrote to memory of 2184 1636 yahoo.exe 37 PID 1636 wrote to memory of 2184 1636 yahoo.exe 37 PID 1636 wrote to memory of 2184 1636 yahoo.exe 37 PID 2184 wrote to memory of 2412 2184 yahoo.exe 38 PID 2184 wrote to memory of 2412 2184 yahoo.exe 38 PID 2184 wrote to memory of 2412 2184 yahoo.exe 38 PID 2184 wrote to memory of 2412 2184 yahoo.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 464 "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 532 "C:\Windows\SysWOW64\yahoo.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 524 "C:\Windows\SysWOW64\yahoo.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 524 "C:\Windows\SysWOW64\yahoo.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:288 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 536 "C:\Windows\SysWOW64\yahoo.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2308 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 524 "C:\Windows\SysWOW64\yahoo.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2136 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1524 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 524 "C:\Windows\SysWOW64\yahoo.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 524 "C:\Windows\SysWOW64\yahoo.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 524 "C:\Windows\SysWOW64\yahoo.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1932 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 528 "C:\Windows\SysWOW64\yahoo.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:924 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2120
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5ddedee54abad0262cd8c564f39f0043a
SHA15c737d85f90cf76f39acd2ef0d05cff5dee5969e
SHA256431b5f3655fecd05e756cfbc183277ed7b4a62ce7a29593fbc8625e855ba41a9
SHA512b481f7d783aca2a79381b6a355e78e0f90e8af13fcd19ef043d5954ce3e397832386f1c4435e7cfdc8bb092ced910bf5c0ae1ad43cd998551034218396b05feb
-
Filesize
608KB
MD58993c57cdf870273d2bbba40f93a3709
SHA1c161a3b871b97e094794d57b9f5fbef2235473dd
SHA2562f01c83de89e09d19fec0a34610e1e4e08f97d1d63994971290a58f5843d6c3a
SHA512cda4bdbe76dd561663d918cc87abfcb7d0071f7d8dbb448826369cfc0421aa5c946576f119a39b86c6c7a2c588ab41e8b3322fde73aa8558f21fde8f97c814c8