General

  • Target

    f7f7bb064a43b9f12e48ddf1da5844ab_JaffaCakes118

  • Size

    92KB

  • Sample

    240418-pd27ssch65

  • MD5

    f7f7bb064a43b9f12e48ddf1da5844ab

  • SHA1

    bb8779a3f2328b4c542630ecbdb830da3f32b8a8

  • SHA256

    10d49d57039175208b2c0689f29328df23d5a39ef0ae021d70faf2bcb4037348

  • SHA512

    fdeda9a4821effcc0dbf6d74b050e0bee07593aa1aa647625354ad14a8bd9bd827ca3f2ceefd6074bf56c4e4ac79cce323c2bb07f30172d780572946b75eb629

  • SSDEEP

    1536:Y4m3M16T3xNKfvTcR8i8+QNDvCk849KyCmSwevSc:m3M16Th8fvTFkEvCkdU3wev/

Malware Config

Extracted

Family

metasploit

Version

encoder/call4_dword_xor

Targets

    • Target

      f7f7bb064a43b9f12e48ddf1da5844ab_JaffaCakes118

    • Size

      92KB

    • MD5

      f7f7bb064a43b9f12e48ddf1da5844ab

    • SHA1

      bb8779a3f2328b4c542630ecbdb830da3f32b8a8

    • SHA256

      10d49d57039175208b2c0689f29328df23d5a39ef0ae021d70faf2bcb4037348

    • SHA512

      fdeda9a4821effcc0dbf6d74b050e0bee07593aa1aa647625354ad14a8bd9bd827ca3f2ceefd6074bf56c4e4ac79cce323c2bb07f30172d780572946b75eb629

    • SSDEEP

      1536:Y4m3M16T3xNKfvTcR8i8+QNDvCk849KyCmSwevSc:m3M16Th8fvTFkEvCkdU3wev/

    • MetaSploit

      Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

    • Adds policy Run key to start application

    • Executes dropped EXE

    • Adds Run key to start application

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks