Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
23-06-2024 07:48
Behavioral task
behavioral1
Sample
0599cd0641cbe46106afdd7eef5badc5_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0599cd0641cbe46106afdd7eef5badc5_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0599cd0641cbe46106afdd7eef5badc5_JaffaCakes118.exe
-
Size
37KB
-
MD5
0599cd0641cbe46106afdd7eef5badc5
-
SHA1
513b7898eb5cedaafb74faba01e9f87016860fa1
-
SHA256
0e142d99862a429aa1ac9bd037c77760dada6326c567a936ad6e0bb9a6200231
-
SHA512
8cbf3eb18cf77e3969b6411fd5357f899f3a04de6aeb53a4a9632e0e09937775ba16b693f5509a7991cf77a80ba48b75892e5624a7f5914f6bbd469ff4164b10
-
SSDEEP
768:NHATS8WhLFCUIdG76O7AtmqLqNPMsKpQ6lRZ95x:xVtDoGzk8w4PMXph5x
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 896 4684 WerFault.exe 0599cd0641cbe46106afdd7eef5badc5_JaffaCakes118.exe 4520 4684 WerFault.exe 0599cd0641cbe46106afdd7eef5badc5_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0599cd0641cbe46106afdd7eef5badc5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0599cd0641cbe46106afdd7eef5badc5_JaffaCakes118.exe"1⤵PID:4684
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 1922⤵
- Program crash
PID:896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4684 -s 2282⤵
- Program crash
PID:4520
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4684 -ip 46841⤵PID:3340
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 516 -p 4684 -ip 46841⤵PID:4664