General
-
Target
a96cd4209be6d6310f4d5a5cfa12c367_JaffaCakes118
-
Size
268KB
-
Sample
240819-d5l44swanp
-
MD5
a96cd4209be6d6310f4d5a5cfa12c367
-
SHA1
014fe033dbaa8c1bdefa25839aaff272d34cd636
-
SHA256
761842a404f0451189ac30415bf07d18c0957a27a17206aa2881e528666c47fc
-
SHA512
a25e17cabf80ce0e03da228278653d69a584a711c8e297f5c55cb7cd6280d0b0492780f03604c22b2484028a8e8b7c9889036334de826d6bab171d015dff19e8
-
SSDEEP
6144:ke3rGJPGVuO2nAJB2lzF6H/NFkakPQ+TQtgHRbbNsBV:ke765O2mIoHlSaWGA/NsB
Static task
static1
Behavioral task
behavioral1
Sample
a96cd4209be6d6310f4d5a5cfa12c367_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a96cd4209be6d6310f4d5a5cfa12c367_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
a96cd4209be6d6310f4d5a5cfa12c367_JaffaCakes118
-
Size
268KB
-
MD5
a96cd4209be6d6310f4d5a5cfa12c367
-
SHA1
014fe033dbaa8c1bdefa25839aaff272d34cd636
-
SHA256
761842a404f0451189ac30415bf07d18c0957a27a17206aa2881e528666c47fc
-
SHA512
a25e17cabf80ce0e03da228278653d69a584a711c8e297f5c55cb7cd6280d0b0492780f03604c22b2484028a8e8b7c9889036334de826d6bab171d015dff19e8
-
SSDEEP
6144:ke3rGJPGVuO2nAJB2lzF6H/NFkakPQ+TQtgHRbbNsBV:ke765O2mIoHlSaWGA/NsB
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-