Analysis
-
max time kernel
144s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 07:16
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe
-
Size
608KB
-
MD5
8993c57cdf870273d2bbba40f93a3709
-
SHA1
c161a3b871b97e094794d57b9f5fbef2235473dd
-
SHA256
2f01c83de89e09d19fec0a34610e1e4e08f97d1d63994971290a58f5843d6c3a
-
SHA512
cda4bdbe76dd561663d918cc87abfcb7d0071f7d8dbb448826369cfc0421aa5c946576f119a39b86c6c7a2c588ab41e8b3322fde73aa8558f21fde8f97c814c8
-
SSDEEP
12288:TiZGqXOv0AcArZ+zTf3qalh0CYdxIK4h5kfZh1UyknblgoqTSBE:TasebTOHIK4h5kR3Uh5qoE
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 20 IoCs
pid Process 3868 yahoo.exe 4672 yahoo.exe 3088 yahoo.exe 2992 yahoo.exe 3992 yahoo.exe 612 yahoo.exe 5652 yahoo.exe 980 yahoo.exe 660 yahoo.exe 1572 yahoo.exe 4696 yahoo.exe 2260 yahoo.exe 4352 yahoo.exe 2308 yahoo.exe 3060 yahoo.exe 4664 yahoo.exe 2584 yahoo.exe 3052 yahoo.exe 6016 yahoo.exe 5696 yahoo.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe File created C:\Windows\SysWOW64\yahoo.exe yahoo.exe File opened for modification C:\Windows\SysWOW64\yahoo.exe yahoo.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 3460 set thread context of 2128 3460 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 89 PID 3868 set thread context of 4672 3868 yahoo.exe 91 PID 3088 set thread context of 2992 3088 yahoo.exe 99 PID 3992 set thread context of 612 3992 yahoo.exe 103 PID 5652 set thread context of 980 5652 yahoo.exe 112 PID 660 set thread context of 1572 660 yahoo.exe 114 PID 4696 set thread context of 2260 4696 yahoo.exe 117 PID 4352 set thread context of 2308 4352 yahoo.exe 119 PID 3060 set thread context of 4664 3060 yahoo.exe 121 PID 2584 set thread context of 3052 2584 yahoo.exe 123 PID 6016 set thread context of 5696 6016 yahoo.exe 125 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language yahoo.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3460 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 3868 yahoo.exe 3088 yahoo.exe 3992 yahoo.exe 5652 yahoo.exe 660 yahoo.exe 4696 yahoo.exe 4352 yahoo.exe 3060 yahoo.exe 2584 yahoo.exe 6016 yahoo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3460 wrote to memory of 2128 3460 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 89 PID 3460 wrote to memory of 2128 3460 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 89 PID 3460 wrote to memory of 2128 3460 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 89 PID 3460 wrote to memory of 2128 3460 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 89 PID 3460 wrote to memory of 2128 3460 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 89 PID 3460 wrote to memory of 2128 3460 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 89 PID 3460 wrote to memory of 2128 3460 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 89 PID 3460 wrote to memory of 2128 3460 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 89 PID 3460 wrote to memory of 2128 3460 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 89 PID 3460 wrote to memory of 2128 3460 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 89 PID 3460 wrote to memory of 2128 3460 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 89 PID 2128 wrote to memory of 3868 2128 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 90 PID 2128 wrote to memory of 3868 2128 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 90 PID 2128 wrote to memory of 3868 2128 JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe 90 PID 3868 wrote to memory of 4672 3868 yahoo.exe 91 PID 3868 wrote to memory of 4672 3868 yahoo.exe 91 PID 3868 wrote to memory of 4672 3868 yahoo.exe 91 PID 3868 wrote to memory of 4672 3868 yahoo.exe 91 PID 3868 wrote to memory of 4672 3868 yahoo.exe 91 PID 3868 wrote to memory of 4672 3868 yahoo.exe 91 PID 3868 wrote to memory of 4672 3868 yahoo.exe 91 PID 3868 wrote to memory of 4672 3868 yahoo.exe 91 PID 3868 wrote to memory of 4672 3868 yahoo.exe 91 PID 3868 wrote to memory of 4672 3868 yahoo.exe 91 PID 3868 wrote to memory of 4672 3868 yahoo.exe 91 PID 4672 wrote to memory of 3088 4672 yahoo.exe 98 PID 4672 wrote to memory of 3088 4672 yahoo.exe 98 PID 4672 wrote to memory of 3088 4672 yahoo.exe 98 PID 3088 wrote to memory of 2992 3088 yahoo.exe 99 PID 3088 wrote to memory of 2992 3088 yahoo.exe 99 PID 3088 wrote to memory of 2992 3088 yahoo.exe 99 PID 3088 wrote to memory of 2992 3088 yahoo.exe 99 PID 3088 wrote to memory of 2992 3088 yahoo.exe 99 PID 3088 wrote to memory of 2992 3088 yahoo.exe 99 PID 3088 wrote to memory of 2992 3088 yahoo.exe 99 PID 3088 wrote to memory of 2992 3088 yahoo.exe 99 PID 3088 wrote to memory of 2992 3088 yahoo.exe 99 PID 3088 wrote to memory of 2992 3088 yahoo.exe 99 PID 3088 wrote to memory of 2992 3088 yahoo.exe 99 PID 2992 wrote to memory of 3992 2992 yahoo.exe 102 PID 2992 wrote to memory of 3992 2992 yahoo.exe 102 PID 2992 wrote to memory of 3992 2992 yahoo.exe 102 PID 3992 wrote to memory of 612 3992 yahoo.exe 103 PID 3992 wrote to memory of 612 3992 yahoo.exe 103 PID 3992 wrote to memory of 612 3992 yahoo.exe 103 PID 3992 wrote to memory of 612 3992 yahoo.exe 103 PID 3992 wrote to memory of 612 3992 yahoo.exe 103 PID 3992 wrote to memory of 612 3992 yahoo.exe 103 PID 3992 wrote to memory of 612 3992 yahoo.exe 103 PID 3992 wrote to memory of 612 3992 yahoo.exe 103 PID 3992 wrote to memory of 612 3992 yahoo.exe 103 PID 3992 wrote to memory of 612 3992 yahoo.exe 103 PID 3992 wrote to memory of 612 3992 yahoo.exe 103 PID 612 wrote to memory of 5652 612 yahoo.exe 111 PID 612 wrote to memory of 5652 612 yahoo.exe 111 PID 612 wrote to memory of 5652 612 yahoo.exe 111 PID 5652 wrote to memory of 980 5652 yahoo.exe 112 PID 5652 wrote to memory of 980 5652 yahoo.exe 112 PID 5652 wrote to memory of 980 5652 yahoo.exe 112 PID 5652 wrote to memory of 980 5652 yahoo.exe 112 PID 5652 wrote to memory of 980 5652 yahoo.exe 112 PID 5652 wrote to memory of 980 5652 yahoo.exe 112 PID 5652 wrote to memory of 980 5652 yahoo.exe 112 PID 5652 wrote to memory of 980 5652 yahoo.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe"2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 1128 "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8993c57cdf870273d2bbba40f93a3709.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 1148 "C:\Windows\SysWOW64\yahoo.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 1120 "C:\Windows\SysWOW64\yahoo.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 1124 "C:\Windows\SysWOW64\yahoo.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5652 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:980 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 1124 "C:\Windows\SysWOW64\yahoo.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:660 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 1120 "C:\Windows\SysWOW64\yahoo.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4696 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 1124 "C:\Windows\SysWOW64\yahoo.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4352 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 1112 "C:\Windows\SysWOW64\yahoo.exe"17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3060 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4664 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 1120 "C:\Windows\SysWOW64\yahoo.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Windows\SysWOW64\yahoo.exeC:\Windows\system32\yahoo.exe 1120 "C:\Windows\SysWOW64\yahoo.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:6016 -
C:\Windows\SysWOW64\yahoo.exe"C:\Windows\SysWOW64\yahoo.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5696
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5ddedee54abad0262cd8c564f39f0043a
SHA15c737d85f90cf76f39acd2ef0d05cff5dee5969e
SHA256431b5f3655fecd05e756cfbc183277ed7b4a62ce7a29593fbc8625e855ba41a9
SHA512b481f7d783aca2a79381b6a355e78e0f90e8af13fcd19ef043d5954ce3e397832386f1c4435e7cfdc8bb092ced910bf5c0ae1ad43cd998551034218396b05feb
-
Filesize
608KB
MD58993c57cdf870273d2bbba40f93a3709
SHA1c161a3b871b97e094794d57b9f5fbef2235473dd
SHA2562f01c83de89e09d19fec0a34610e1e4e08f97d1d63994971290a58f5843d6c3a
SHA512cda4bdbe76dd561663d918cc87abfcb7d0071f7d8dbb448826369cfc0421aa5c946576f119a39b86c6c7a2c588ab41e8b3322fde73aa8558f21fde8f97c814c8