Analysis
-
max time kernel
146s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 13:31
Behavioral task
behavioral1
Sample
JaffaCakes118_98bdfe850392488fdf9c095dec277d7a.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_98bdfe850392488fdf9c095dec277d7a.dll
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_98bdfe850392488fdf9c095dec277d7a.dll
-
Size
92KB
-
MD5
98bdfe850392488fdf9c095dec277d7a
-
SHA1
a5955cee800b82cb4f4960022a458aa6315e7bdd
-
SHA256
8ccd60bef0c3fec91c51f3ac7c473d342b6dc6145f3267f0f780afeebf726380
-
SHA512
e71dc8483fac2b70db688ecb31932d4ec80cb9d559151910136ebd60c6a2beea5a7daaa25105957851c1834d636741d6ee950a4226959539db4c0830d6b93cc7
-
SSDEEP
1536:zShWgnBHBqL2uPj+v/9qYziQnk2E4C11O/FmHTD34CYYhh9QIZ5O8hvEnmnt:+WgBHBqS9qYziQnXEd11lheIZ5lwm
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Deletes itself 1 IoCs
pid Process 2860 cmd.exe -
Loads dropped DLL 4 IoCs
pid Process 2756 rundll32.exe 2756 rundll32.exe 2756 rundll32.exe 2756 rundll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WinDLL (nnetstats.exe) = "rundll32.exe C:\\Windows\\system32\\nnetstats.exe,start" rundll32.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\nnetstats.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\nnetstats.exe rundll32.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2652 explorer.exe -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe Token: SeShutdownPrivilege 2652 explorer.exe -
Suspicious use of FindShellTrayWindow 30 IoCs
pid Process 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe -
Suspicious use of SendNotifyMessage 23 IoCs
pid Process 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe 2652 explorer.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2732 wrote to memory of 3036 2732 rundll32.exe 30 PID 2732 wrote to memory of 3036 2732 rundll32.exe 30 PID 2732 wrote to memory of 3036 2732 rundll32.exe 30 PID 2732 wrote to memory of 3036 2732 rundll32.exe 30 PID 2732 wrote to memory of 3036 2732 rundll32.exe 30 PID 2732 wrote to memory of 3036 2732 rundll32.exe 30 PID 2732 wrote to memory of 3036 2732 rundll32.exe 30 PID 3036 wrote to memory of 2756 3036 rundll32.exe 31 PID 3036 wrote to memory of 2756 3036 rundll32.exe 31 PID 3036 wrote to memory of 2756 3036 rundll32.exe 31 PID 3036 wrote to memory of 2756 3036 rundll32.exe 31 PID 3036 wrote to memory of 2756 3036 rundll32.exe 31 PID 3036 wrote to memory of 2756 3036 rundll32.exe 31 PID 3036 wrote to memory of 2756 3036 rundll32.exe 31 PID 3036 wrote to memory of 2860 3036 rundll32.exe 32 PID 3036 wrote to memory of 2860 3036 rundll32.exe 32 PID 3036 wrote to memory of 2860 3036 rundll32.exe 32 PID 3036 wrote to memory of 2860 3036 rundll32.exe 32 PID 3036 wrote to memory of 2860 3036 rundll32.exe 32 PID 3036 wrote to memory of 2860 3036 rundll32.exe 32 PID 3036 wrote to memory of 2860 3036 rundll32.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98bdfe850392488fdf9c095dec277d7a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98bdfe850392488fdf9c095dec277d7a.dll,#12⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\System32\rundll32.exe" C:\Windows\system32\nnetstats.exe,start3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\uninstall.bat" "3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2860
-
-
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2652
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
266B
MD55cb9814c38b335962a9c1292c26ee88c
SHA195a4ae5bb6dc8f29f875bab1e4b947ab76d70874
SHA25616b78937aef1d0cb149ac3f485b1b637c98f053a99bfa67b0ddbe5cffb2ea90e
SHA512e7a60d7512da95659f131345df69b26b7947a6599606aac7436865192eb5513417531d6617f2e88c4db61467a7ebf6fdfc6862eb5ff361ac4695c8d0625fb2a4
-
Filesize
92KB
MD598bdfe850392488fdf9c095dec277d7a
SHA1a5955cee800b82cb4f4960022a458aa6315e7bdd
SHA2568ccd60bef0c3fec91c51f3ac7c473d342b6dc6145f3267f0f780afeebf726380
SHA512e71dc8483fac2b70db688ecb31932d4ec80cb9d559151910136ebd60c6a2beea5a7daaa25105957851c1834d636741d6ee950a4226959539db4c0830d6b93cc7