Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
11-05-2024 22:54
Behavioral task
behavioral1
Sample
36f9dbf2b3b4045153a5b37020b1c49e_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
36f9dbf2b3b4045153a5b37020b1c49e_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
36f9dbf2b3b4045153a5b37020b1c49e_JaffaCakes118.exe
-
Size
15KB
-
MD5
36f9dbf2b3b4045153a5b37020b1c49e
-
SHA1
10b8d331844f041808a1bb52331c72e8eb5fcb2b
-
SHA256
0fa10535009f401320ee107d099f65e0c34ad5c1be39fbc6657e2007c45da365
-
SHA512
5dfa4f417380c0a8deb0689a0229273db91f3421072f2fb3aee8a57ad982bb5c3b13ec21ddedaada428953a9ecf0fe52a312074f5b73b0aaac2a05190b30f945
-
SSDEEP
384:zLU/8QeJUc4XNdz9zzlq/nKnWShGeaqrt:nUcedz94/DShb
Malware Config
Extracted
metasploit
windows/download_exec
http://opesmsploit.ddns.net:53/XpZX
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Processes:
resource yara_rule behavioral2/memory/644-0-0x0000000000400000-0x000000000040C000-memory.dmp upx behavioral2/memory/644-2-0x0000000000400000-0x000000000040C000-memory.dmp upx