General
-
Target
fe9caffa1d2374aabb3a26ff8897d387_JaffaCakes118
-
Size
177KB
-
Sample
240421-gs7rtsda43
-
MD5
fe9caffa1d2374aabb3a26ff8897d387
-
SHA1
1e206db58659d005e3a5bc666f2c5409fc671efe
-
SHA256
e39af0ec5806f9667476d8d519cb1c8decc1a307fada663a67a5cd973180b4ed
-
SHA512
8c02427428786a26fedffeb0a32dbef1035a005e7ffabbf7ff9a4f29c6eb2f4267a0f64d65b2897dce8ee587b8e0f37edb9ffc3064d163ea57e631ded953b8a3
-
SSDEEP
3072:1CqstM6xlOcA7w4xabrXL1yn8BG0a6Va2j6pZd2iYk9Hc3/nl6LAHkzI1U0gEA6F:ctMilOK4x27L1g2G0vVT6pZMzk96RAA
Behavioral task
behavioral1
Sample
fe9caffa1d2374aabb3a26ff8897d387_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fe9caffa1d2374aabb3a26ff8897d387_JaffaCakes118.exe
Resource
win10v2004-20240412-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
fe9caffa1d2374aabb3a26ff8897d387_JaffaCakes118
-
Size
177KB
-
MD5
fe9caffa1d2374aabb3a26ff8897d387
-
SHA1
1e206db58659d005e3a5bc666f2c5409fc671efe
-
SHA256
e39af0ec5806f9667476d8d519cb1c8decc1a307fada663a67a5cd973180b4ed
-
SHA512
8c02427428786a26fedffeb0a32dbef1035a005e7ffabbf7ff9a4f29c6eb2f4267a0f64d65b2897dce8ee587b8e0f37edb9ffc3064d163ea57e631ded953b8a3
-
SSDEEP
3072:1CqstM6xlOcA7w4xabrXL1yn8BG0a6Va2j6pZd2iYk9Hc3/nl6LAHkzI1U0gEA6F:ctMilOK4x27L1g2G0vVT6pZMzk96RAA
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies Installed Components in the registry
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-