Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    29-05-2024 06:02

General

  • Target

    7fb97096401e92ef641097f08ab45d6d_JaffaCakes118.exe

  • Size

    1024B

  • MD5

    7fb97096401e92ef641097f08ab45d6d

  • SHA1

    8d7d2089f4c795f94145698c814fcc0ba57562fb

  • SHA256

    c94bee7fe9dc0702d703c5e5ec75b103a19bb2de0e6b3732ca79d697a7ff9f19

  • SHA512

    21bef7eb8f63b012168ae91ae049f92eb1fe3d4e8efeb5d393dad3f65b189161955fca1d6d44ae44907374ca36393ff04ead0a3448bf7c7b5886c01c6394ce46

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://10.1.22.251:443/Dl5w

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fb97096401e92ef641097f08ab45d6d_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\7fb97096401e92ef641097f08ab45d6d_JaffaCakes118.exe"
    1⤵
      PID:2404

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2404-0-0x00000000012D0000-0x00000000012D11E8-memory.dmp
      Filesize

      4KB