Analysis
-
max time kernel
85s -
max time network
78s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08-07-2024 05:22
Static task
static1
Behavioral task
behavioral1
Sample
2b1fb890f57fbd35aad7ccdb7a557e4e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2b1fb890f57fbd35aad7ccdb7a557e4e_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2b1fb890f57fbd35aad7ccdb7a557e4e_JaffaCakes118.exe
-
Size
52KB
-
MD5
2b1fb890f57fbd35aad7ccdb7a557e4e
-
SHA1
20537c655e8bfecb26b971bdb0a4f50aa86f1376
-
SHA256
a9f5c307b10c9f4d66e2a18bcc2e711edbf83e7792f8c096bb1f4832bc03e4e6
-
SHA512
aaf316c4322e22ac3a5189e128ac9c0567100cfe0afa05b35c8432831d7e38f72b5afbb9ffbc7bacb373ee6f6d90f6ada4a0d01833933253b95c94af6fcfa21a
-
SSDEEP
1536:g8b/w6R//CAMGB3H4RkiaMRnOkm0DyB6DQ8+cZ:V//uqH4R7FhONoAw
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2552 2b1fb890f57fbd35aad7ccdb7a557e4e_JaffaCakes118.exe