Analysis
-
max time kernel
137s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 17:08
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe
Resource
win10v2004-20250410-en
General
-
Target
JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe
-
Size
222KB
-
MD5
b870ed659797c70d3155cbfc67a275b9
-
SHA1
12743a476b9b2adf97b20946971f7257922179ba
-
SHA256
96beda72ed59030e60427b3b995847a62ec89b1dd84c3f522775d2985b261c6e
-
SHA512
b08ff02bcaf6d637607ef4eb9e2d9ba27a3a6267e9c7315dc9fe83c45624d76457786f0fdaf68f273a91c05c88e8cda2af8876da45a24a5d3ee0947be36f1167
-
SSDEEP
6144:KrsIjjoR5J0dEZUWIL91NUtcAU4Sf+gzDEJ/z4vzRdK:8jY2ECpUJC+gnqz4vzu
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE 20 IoCs
pid Process 3288 winslog.exe 3352 winslog.exe 5672 winslog.exe 5092 winslog.exe 1116 winslog.exe 4656 winslog.exe 4776 winslog.exe 5004 winslog.exe 4784 winslog.exe 1000 winslog.exe 3224 winslog.exe 3736 winslog.exe 1596 winslog.exe 5576 winslog.exe 1432 winslog.exe 2012 winslog.exe 3300 winslog.exe 2128 winslog.exe 1368 winslog.exe 4552 winslog.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\winslog.exe winslog.exe File opened for modification C:\Windows\SysWOW64\winslog.exe winslog.exe File created C:\Windows\SysWOW64\winslog.exe winslog.exe File created C:\Windows\SysWOW64\winslog.exe winslog.exe File opened for modification C:\Windows\SysWOW64\winslog.exe winslog.exe File opened for modification C:\Windows\SysWOW64\winslog.exe winslog.exe File created C:\Windows\SysWOW64\winslog.exe winslog.exe File opened for modification C:\Windows\SysWOW64\winslog.exe winslog.exe File created C:\Windows\SysWOW64\winslog.exe winslog.exe File opened for modification C:\Windows\SysWOW64\winslog.exe winslog.exe File created C:\Windows\SysWOW64\winslog.exe winslog.exe File created C:\Windows\SysWOW64\winslog.exe winslog.exe File opened for modification C:\Windows\SysWOW64\winslog.exe winslog.exe File opened for modification C:\Windows\SysWOW64\winslog.exe winslog.exe File opened for modification C:\Windows\SysWOW64\winslog.exe winslog.exe File created C:\Windows\SysWOW64\winslog.exe JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe File opened for modification C:\Windows\SysWOW64\winslog.exe JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe File created C:\Windows\SysWOW64\winslog.exe winslog.exe File opened for modification C:\Windows\SysWOW64\winslog.exe winslog.exe File created C:\Windows\SysWOW64\winslog.exe winslog.exe File created C:\Windows\SysWOW64\winslog.exe winslog.exe File opened for modification C:\Windows\SysWOW64\winslog.exe winslog.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 3180 set thread context of 2612 3180 JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe 86 PID 3288 set thread context of 3352 3288 winslog.exe 90 PID 5672 set thread context of 5092 5672 winslog.exe 94 PID 1116 set thread context of 4656 1116 winslog.exe 98 PID 4776 set thread context of 5004 4776 winslog.exe 101 PID 4784 set thread context of 1000 4784 winslog.exe 103 PID 3224 set thread context of 3736 3224 winslog.exe 105 PID 1596 set thread context of 5576 1596 winslog.exe 107 PID 1432 set thread context of 2012 1432 winslog.exe 109 PID 3300 set thread context of 2128 3300 winslog.exe 111 PID 1368 set thread context of 4552 1368 winslog.exe 113 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winslog.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3180 wrote to memory of 2612 3180 JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe 86 PID 3180 wrote to memory of 2612 3180 JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe 86 PID 3180 wrote to memory of 2612 3180 JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe 86 PID 3180 wrote to memory of 2612 3180 JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe 86 PID 3180 wrote to memory of 2612 3180 JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe 86 PID 2612 wrote to memory of 3288 2612 JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe 89 PID 2612 wrote to memory of 3288 2612 JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe 89 PID 2612 wrote to memory of 3288 2612 JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe 89 PID 3288 wrote to memory of 3352 3288 winslog.exe 90 PID 3288 wrote to memory of 3352 3288 winslog.exe 90 PID 3288 wrote to memory of 3352 3288 winslog.exe 90 PID 3288 wrote to memory of 3352 3288 winslog.exe 90 PID 3288 wrote to memory of 3352 3288 winslog.exe 90 PID 3352 wrote to memory of 5672 3352 winslog.exe 93 PID 3352 wrote to memory of 5672 3352 winslog.exe 93 PID 3352 wrote to memory of 5672 3352 winslog.exe 93 PID 5672 wrote to memory of 5092 5672 winslog.exe 94 PID 5672 wrote to memory of 5092 5672 winslog.exe 94 PID 5672 wrote to memory of 5092 5672 winslog.exe 94 PID 5672 wrote to memory of 5092 5672 winslog.exe 94 PID 5672 wrote to memory of 5092 5672 winslog.exe 94 PID 5092 wrote to memory of 1116 5092 winslog.exe 97 PID 5092 wrote to memory of 1116 5092 winslog.exe 97 PID 5092 wrote to memory of 1116 5092 winslog.exe 97 PID 1116 wrote to memory of 4656 1116 winslog.exe 98 PID 1116 wrote to memory of 4656 1116 winslog.exe 98 PID 1116 wrote to memory of 4656 1116 winslog.exe 98 PID 1116 wrote to memory of 4656 1116 winslog.exe 98 PID 1116 wrote to memory of 4656 1116 winslog.exe 98 PID 4656 wrote to memory of 4776 4656 winslog.exe 100 PID 4656 wrote to memory of 4776 4656 winslog.exe 100 PID 4656 wrote to memory of 4776 4656 winslog.exe 100 PID 4776 wrote to memory of 5004 4776 winslog.exe 101 PID 4776 wrote to memory of 5004 4776 winslog.exe 101 PID 4776 wrote to memory of 5004 4776 winslog.exe 101 PID 4776 wrote to memory of 5004 4776 winslog.exe 101 PID 4776 wrote to memory of 5004 4776 winslog.exe 101 PID 5004 wrote to memory of 4784 5004 winslog.exe 102 PID 5004 wrote to memory of 4784 5004 winslog.exe 102 PID 5004 wrote to memory of 4784 5004 winslog.exe 102 PID 4784 wrote to memory of 1000 4784 winslog.exe 103 PID 4784 wrote to memory of 1000 4784 winslog.exe 103 PID 4784 wrote to memory of 1000 4784 winslog.exe 103 PID 4784 wrote to memory of 1000 4784 winslog.exe 103 PID 4784 wrote to memory of 1000 4784 winslog.exe 103 PID 1000 wrote to memory of 3224 1000 winslog.exe 104 PID 1000 wrote to memory of 3224 1000 winslog.exe 104 PID 1000 wrote to memory of 3224 1000 winslog.exe 104 PID 3224 wrote to memory of 3736 3224 winslog.exe 105 PID 3224 wrote to memory of 3736 3224 winslog.exe 105 PID 3224 wrote to memory of 3736 3224 winslog.exe 105 PID 3224 wrote to memory of 3736 3224 winslog.exe 105 PID 3224 wrote to memory of 3736 3224 winslog.exe 105 PID 3736 wrote to memory of 1596 3736 winslog.exe 106 PID 3736 wrote to memory of 1596 3736 winslog.exe 106 PID 3736 wrote to memory of 1596 3736 winslog.exe 106 PID 1596 wrote to memory of 5576 1596 winslog.exe 107 PID 1596 wrote to memory of 5576 1596 winslog.exe 107 PID 1596 wrote to memory of 5576 1596 winslog.exe 107 PID 1596 wrote to memory of 5576 1596 winslog.exe 107 PID 1596 wrote to memory of 5576 1596 winslog.exe 107 PID 5576 wrote to memory of 1432 5576 winslog.exe 108 PID 5576 wrote to memory of 1432 5576 winslog.exe 108 PID 5576 wrote to memory of 1432 5576 winslog.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\system32\winslog.exe 1000 "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_b870ed659797c70d3155cbfc67a275b9.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\SysWOW64\winslog.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\system32\winslog.exe 1152 "C:\Windows\SysWOW64\winslog.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5672 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\SysWOW64\winslog.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\system32\winslog.exe 1124 "C:\Windows\SysWOW64\winslog.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\SysWOW64\winslog.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\system32\winslog.exe 1128 "C:\Windows\SysWOW64\winslog.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\SysWOW64\winslog.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\system32\winslog.exe 1124 "C:\Windows\SysWOW64\winslog.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\SysWOW64\winslog.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\system32\winslog.exe 1120 "C:\Windows\SysWOW64\winslog.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\SysWOW64\winslog.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\system32\winslog.exe 1120 "C:\Windows\SysWOW64\winslog.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\SysWOW64\winslog.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5576 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\system32\winslog.exe 1120 "C:\Windows\SysWOW64\winslog.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1432 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\SysWOW64\winslog.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\system32\winslog.exe 1120 "C:\Windows\SysWOW64\winslog.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3300 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\SysWOW64\winslog.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2128 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\system32\winslog.exe 1124 "C:\Windows\SysWOW64\winslog.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\winslog.exeC:\Windows\SysWOW64\winslog.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4552
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
222KB
MD5b870ed659797c70d3155cbfc67a275b9
SHA112743a476b9b2adf97b20946971f7257922179ba
SHA25696beda72ed59030e60427b3b995847a62ec89b1dd84c3f522775d2985b261c6e
SHA512b08ff02bcaf6d637607ef4eb9e2d9ba27a3a6267e9c7315dc9fe83c45624d76457786f0fdaf68f273a91c05c88e8cda2af8876da45a24a5d3ee0947be36f1167