Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 12:30
Behavioral task
behavioral1
Sample
ff476c9ef2fd7ac658e2c7d371d81d46_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
ff476c9ef2fd7ac658e2c7d371d81d46_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff476c9ef2fd7ac658e2c7d371d81d46_JaffaCakes118.exe
-
Size
9KB
-
MD5
ff476c9ef2fd7ac658e2c7d371d81d46
-
SHA1
c4ece5479205d5b9461ae3ad7aed98e059296c8c
-
SHA256
28ed5975a551340140e7f642e562024eddc0abc8ce1db369e99368ea2c19b3b6
-
SHA512
0b13b783b9503335b80577cf9598ec64d2a9e9bc4cc5705abcc51b87ad8db90d04ce300a3046a400b7d9d15a81f38816f4955bf9681ebc68800444dfb2784fcb
-
SSDEEP
192:qCj7PhL6nwDjO4C0/lgBl/0C0zb7E5pz6rJoZZIe:qq7ZOnSjJT/SBCTzb7mT
Malware Config
Extracted
metasploit
windows/single_exec
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
ff476c9ef2fd7ac658e2c7d371d81d46_JaffaCakes118.exedescription pid process target process PID 2996 wrote to memory of 3068 2996 ff476c9ef2fd7ac658e2c7d371d81d46_JaffaCakes118.exe calc.exe PID 2996 wrote to memory of 3068 2996 ff476c9ef2fd7ac658e2c7d371d81d46_JaffaCakes118.exe calc.exe PID 2996 wrote to memory of 3068 2996 ff476c9ef2fd7ac658e2c7d371d81d46_JaffaCakes118.exe calc.exe PID 2996 wrote to memory of 3068 2996 ff476c9ef2fd7ac658e2c7d371d81d46_JaffaCakes118.exe calc.exe