Analysis
-
max time kernel
141s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 19:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe
-
Size
152KB
-
MD5
8a0120fc394173bbcb015e12a7ba49d5
-
SHA1
2e1414c6d1f5856deeaaf6c2836f0dc1ca307dc7
-
SHA256
37ef26d17a636105fe06911c54cedfb08ccafbc1e6fe4a2d8814f7400143b48b
-
SHA512
c68f25523984756d0b5a31c74a7e47ae5491a2cec68045fe0c09a8191aea517ae5f7dbaab8cf3c2b2a4126d8952e1f7daed558814b25caed8f72d29260b40ee4
-
SSDEEP
3072:6t4ctBhUa6yvcBTZmC0Z4OJhuvniuniNUu7Vtyav:wvKFYZOidUu7byav
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wmpktc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wmpktc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wmpktc32.exe Key value queried \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\Control Panel\International\Geo\Nation wmpktc32.exe -
Deletes itself 1 IoCs
pid Process 3412 wmpktc32.exe -
Executes dropped EXE 9 IoCs
pid Process 5984 wmpktc32.exe 3412 wmpktc32.exe 3404 wmpktc32.exe 3916 wmpktc32.exe 3236 wmpktc32.exe 5792 wmpktc32.exe 5188 wmpktc32.exe 3684 wmpktc32.exe 2152 wmpktc32.exe -
Maps connected drives based on registry 3 TTPs 10 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpktc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpktc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpktc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpktc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpktc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpktc32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 wmpktc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum wmpktc32.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmpktc32.exe JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe File opened for modification C:\Windows\SysWOW64\ wmpktc32.exe File created C:\Windows\SysWOW64\wmpktc32.exe wmpktc32.exe File opened for modification C:\Windows\SysWOW64\wmpktc32.exe wmpktc32.exe File opened for modification C:\Windows\SysWOW64\wmpktc32.exe JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe File opened for modification C:\Windows\SysWOW64\ wmpktc32.exe File created C:\Windows\SysWOW64\wmpktc32.exe wmpktc32.exe File opened for modification C:\Windows\SysWOW64\ wmpktc32.exe File created C:\Windows\SysWOW64\wmpktc32.exe wmpktc32.exe File opened for modification C:\Windows\SysWOW64\wmpktc32.exe wmpktc32.exe File created C:\Windows\SysWOW64\wmpktc32.exe wmpktc32.exe File opened for modification C:\Windows\SysWOW64\ JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe File opened for modification C:\Windows\SysWOW64\ wmpktc32.exe File opened for modification C:\Windows\SysWOW64\wmpktc32.exe wmpktc32.exe File opened for modification C:\Windows\SysWOW64\wmpktc32.exe wmpktc32.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 5488 set thread context of 2272 5488 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 96 PID 5984 set thread context of 3412 5984 wmpktc32.exe 106 PID 3404 set thread context of 3916 3404 wmpktc32.exe 109 PID 3236 set thread context of 5792 3236 wmpktc32.exe 111 PID 5188 set thread context of 3684 5188 wmpktc32.exe 113 -
resource yara_rule behavioral2/memory/2272-0-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2272-2-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2272-3-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2272-4-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2272-31-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/2272-41-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3412-45-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3412-46-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3412-47-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3412-48-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3412-53-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3916-61-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/5792-69-0x0000000000400000-0x0000000000456000-memory.dmp upx behavioral2/memory/3684-77-0x0000000000400000-0x0000000000456000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpktc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpktc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpktc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpktc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpktc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpktc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpktc32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmpktc32.exe -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpktc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpktc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpktc32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wmpktc32.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2272 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 2272 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 2272 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 2272 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 3412 wmpktc32.exe 3412 wmpktc32.exe 3412 wmpktc32.exe 3412 wmpktc32.exe 3916 wmpktc32.exe 3916 wmpktc32.exe 3916 wmpktc32.exe 3916 wmpktc32.exe 5792 wmpktc32.exe 5792 wmpktc32.exe 5792 wmpktc32.exe 5792 wmpktc32.exe 3684 wmpktc32.exe 3684 wmpktc32.exe 3684 wmpktc32.exe 3684 wmpktc32.exe -
Suspicious use of WriteProcessMemory 50 IoCs
description pid Process procid_target PID 5488 wrote to memory of 2272 5488 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 96 PID 5488 wrote to memory of 2272 5488 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 96 PID 5488 wrote to memory of 2272 5488 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 96 PID 5488 wrote to memory of 2272 5488 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 96 PID 5488 wrote to memory of 2272 5488 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 96 PID 5488 wrote to memory of 2272 5488 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 96 PID 5488 wrote to memory of 2272 5488 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 96 PID 2272 wrote to memory of 5984 2272 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 97 PID 2272 wrote to memory of 5984 2272 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 97 PID 2272 wrote to memory of 5984 2272 JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe 97 PID 5984 wrote to memory of 3412 5984 wmpktc32.exe 106 PID 5984 wrote to memory of 3412 5984 wmpktc32.exe 106 PID 5984 wrote to memory of 3412 5984 wmpktc32.exe 106 PID 5984 wrote to memory of 3412 5984 wmpktc32.exe 106 PID 5984 wrote to memory of 3412 5984 wmpktc32.exe 106 PID 5984 wrote to memory of 3412 5984 wmpktc32.exe 106 PID 5984 wrote to memory of 3412 5984 wmpktc32.exe 106 PID 3412 wrote to memory of 3404 3412 wmpktc32.exe 107 PID 3412 wrote to memory of 3404 3412 wmpktc32.exe 107 PID 3412 wrote to memory of 3404 3412 wmpktc32.exe 107 PID 3404 wrote to memory of 3916 3404 wmpktc32.exe 109 PID 3404 wrote to memory of 3916 3404 wmpktc32.exe 109 PID 3404 wrote to memory of 3916 3404 wmpktc32.exe 109 PID 3404 wrote to memory of 3916 3404 wmpktc32.exe 109 PID 3404 wrote to memory of 3916 3404 wmpktc32.exe 109 PID 3404 wrote to memory of 3916 3404 wmpktc32.exe 109 PID 3404 wrote to memory of 3916 3404 wmpktc32.exe 109 PID 3916 wrote to memory of 3236 3916 wmpktc32.exe 110 PID 3916 wrote to memory of 3236 3916 wmpktc32.exe 110 PID 3916 wrote to memory of 3236 3916 wmpktc32.exe 110 PID 3236 wrote to memory of 5792 3236 wmpktc32.exe 111 PID 3236 wrote to memory of 5792 3236 wmpktc32.exe 111 PID 3236 wrote to memory of 5792 3236 wmpktc32.exe 111 PID 3236 wrote to memory of 5792 3236 wmpktc32.exe 111 PID 3236 wrote to memory of 5792 3236 wmpktc32.exe 111 PID 3236 wrote to memory of 5792 3236 wmpktc32.exe 111 PID 3236 wrote to memory of 5792 3236 wmpktc32.exe 111 PID 5792 wrote to memory of 5188 5792 wmpktc32.exe 112 PID 5792 wrote to memory of 5188 5792 wmpktc32.exe 112 PID 5792 wrote to memory of 5188 5792 wmpktc32.exe 112 PID 5188 wrote to memory of 3684 5188 wmpktc32.exe 113 PID 5188 wrote to memory of 3684 5188 wmpktc32.exe 113 PID 5188 wrote to memory of 3684 5188 wmpktc32.exe 113 PID 5188 wrote to memory of 3684 5188 wmpktc32.exe 113 PID 5188 wrote to memory of 3684 5188 wmpktc32.exe 113 PID 5188 wrote to memory of 3684 5188 wmpktc32.exe 113 PID 5188 wrote to memory of 3684 5188 wmpktc32.exe 113 PID 3684 wrote to memory of 2152 3684 wmpktc32.exe 114 PID 3684 wrote to memory of 2152 3684 wmpktc32.exe 114 PID 3684 wrote to memory of 2152 3684 wmpktc32.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5488 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_8a0120fc394173bbcb015e12a7ba49d5.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\wmpktc32.exe"C:\Windows\system32\wmpktc32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5984 -
C:\Windows\SysWOW64\wmpktc32.exe"C:\Windows\system32\wmpktc32.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\SysWOW64\wmpktc32.exe"C:\Windows\system32\wmpktc32.exe" C:\Windows\SysWOW64\wmpktc32.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\wmpktc32.exe"C:\Windows\system32\wmpktc32.exe" C:\Windows\SysWOW64\wmpktc32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\wmpktc32.exe"C:\Windows\system32\wmpktc32.exe" C:\Windows\SysWOW64\wmpktc32.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\wmpktc32.exe"C:\Windows\system32\wmpktc32.exe" C:\Windows\SysWOW64\wmpktc32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5792 -
C:\Windows\SysWOW64\wmpktc32.exe"C:\Windows\system32\wmpktc32.exe" C:\Windows\SysWOW64\wmpktc32.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5188 -
C:\Windows\SysWOW64\wmpktc32.exe"C:\Windows\system32\wmpktc32.exe" C:\Windows\SysWOW64\wmpktc32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\wmpktc32.exe"C:\Windows\system32\wmpktc32.exe" C:\Windows\SysWOW64\wmpktc32.exe11⤵
- Executes dropped EXE
PID:2152
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD58a0120fc394173bbcb015e12a7ba49d5
SHA12e1414c6d1f5856deeaaf6c2836f0dc1ca307dc7
SHA25637ef26d17a636105fe06911c54cedfb08ccafbc1e6fe4a2d8814f7400143b48b
SHA512c68f25523984756d0b5a31c74a7e47ae5491a2cec68045fe0c09a8191aea517ae5f7dbaab8cf3c2b2a4126d8952e1f7daed558814b25caed8f72d29260b40ee4