General
-
Target
326f4d706e35367ea914b991700c849d_JaffaCakes118
-
Size
57KB
-
Sample
240709-3jjjjasepr
-
MD5
326f4d706e35367ea914b991700c849d
-
SHA1
44213fc5e24c8041380d60aac1d211bc574a0211
-
SHA256
cb7d950126a8b6cf714d79bce17eb27b9c3f25e6301654531976fefbdfe8749d
-
SHA512
0cda0fcfc7b8ecaba6f4610064c25c540b18b8560b62e91d28f173d2d9198106beb1d25e6a013b4fc46859a708aab7ae7a3722879f72189933e819cb3cfe5e68
-
SSDEEP
768:zYdI0kc7Lsy1lH3FXll6yOdCYfkFYDG4rcor4JDDSVIr0ihR:kyi7LD15VleCYcoQorwDDS1ih
Static task
static1
Behavioral task
behavioral1
Sample
326f4d706e35367ea914b991700c849d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
326f4d706e35367ea914b991700c849d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
326f4d706e35367ea914b991700c849d_JaffaCakes118
-
Size
57KB
-
MD5
326f4d706e35367ea914b991700c849d
-
SHA1
44213fc5e24c8041380d60aac1d211bc574a0211
-
SHA256
cb7d950126a8b6cf714d79bce17eb27b9c3f25e6301654531976fefbdfe8749d
-
SHA512
0cda0fcfc7b8ecaba6f4610064c25c540b18b8560b62e91d28f173d2d9198106beb1d25e6a013b4fc46859a708aab7ae7a3722879f72189933e819cb3cfe5e68
-
SSDEEP
768:zYdI0kc7Lsy1lH3FXll6yOdCYfkFYDG4rcor4JDDSVIr0ihR:kyi7LD15VleCYcoQorwDDS1ih
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-