Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    27/07/2024, 05:44

General

  • Target

    772a4b69345bc988d14ec223f08aa993_JaffaCakes118.exe

  • Size

    112KB

  • MD5

    772a4b69345bc988d14ec223f08aa993

  • SHA1

    0a89be0ea6b180a0d9aa37788a2e3bd83387648a

  • SHA256

    636b88eefb66013aa7bf9e2d3c9e6c3047970873e475726228cc03e69d8adf6d

  • SHA512

    82471b93a27f7956f15b26f42a4304089a65cac3690f2d2baf453f2faaf280e992504dfd125a7fcd7b8fb6ab51670553a51a3150662eb436a47027ae409ae7f9

  • SSDEEP

    1536:HD1O0kO4res1TkU+LSoHN9fqeIT3QYMjSNGLtZhptoPvLV6eBsCXKc:HD1O0cP1PId+/rMjSN+PtoXL1BsC

Malware Config

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.0.14:31337

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\772a4b69345bc988d14ec223f08aa993_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\772a4b69345bc988d14ec223f08aa993_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1924

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/1924-0-0x0000000000170000-0x0000000000171000-memory.dmp

          Filesize

          4KB