Analysis
-
max time kernel
106s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
16-04-2024 03:13
Behavioral task
behavioral1
Sample
f28e8ffa1cb180c7bbc6b120c436499e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f28e8ffa1cb180c7bbc6b120c436499e_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f28e8ffa1cb180c7bbc6b120c436499e_JaffaCakes118.exe
-
Size
112KB
-
MD5
f28e8ffa1cb180c7bbc6b120c436499e
-
SHA1
1d510bc25af71d1c09dee9e2db12cf066d889c10
-
SHA256
dc919f3ae30357af3740bb14ad6e3586108cc6f5cf5f0572527a7e884efa61ad
-
SHA512
02ced12484cf02cfed7a77bc0499c5252d8eedab04568bd6b3dd84697f3455d9fbd56920297eb970d44289baf4dad8b437ff5a4e0f0677383611310f4a03b13d
-
SSDEEP
1536:Rot1Ka7EdD22zJDcPOE1nzEkrkFmfte7fgcwx7N9kpFIKvBiDApQcWOyfJroPv26:RMf7KaUDcWE9InIkhFKdoXbBsc
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
220.220.10.3:443
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/2280-0-0x0000000000510000-0x0000000000511000-memory.dmpFilesize
4KB