Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    18-04-2024 09:23

General

  • Target

    f7b5a2fabce2acf84f5b465e3b1c5e19_JaffaCakes118.exe

  • Size

    3.0MB

  • MD5

    f7b5a2fabce2acf84f5b465e3b1c5e19

  • SHA1

    a8a3159e3128878c1c54835edb24d8f10fea8adc

  • SHA256

    fd87a94c79c08fe4d2e7c55cf9fb400638e154b752b2d2d5f86207c5a2a3b353

  • SHA512

    a980e74930bc32c5b479456f93f98f91d1c3a1bf38ce80f69b10c6037efe9c4871361f7e5702bacf5c495bc227d37c45c5f5e2c8ceab7be9bd270f54c403157d

  • SSDEEP

    49152:9vBfJXAE4pq5PtDZebWSGUDHLtDEy2sr0mRu3ljzSTz7Lv14BBQpsEAvG:9vBfKE4wbZeaSrmy2s76jqPL9UksEAO

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

10.11.12.13:4444

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f7b5a2fabce2acf84f5b465e3b1c5e19_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f7b5a2fabce2acf84f5b465e3b1c5e19_JaffaCakes118.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of SetWindowsHookEx
    PID:1984

Network

MITRE ATT&CK Matrix ATT&CK v13

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1984-0-0x00000000003B0000-0x00000000003B1000-memory.dmp
    Filesize

    4KB

  • memory/1984-1-0x00000000003B0000-0x00000000003B1000-memory.dmp
    Filesize

    4KB