General
-
Target
b617896c55aa7c97f91a7bcc62c3c3ea_JaffaCakes118
-
Size
172KB
-
Sample
240822-dfphyayeqk
-
MD5
b617896c55aa7c97f91a7bcc62c3c3ea
-
SHA1
252fe018613ca18c0918d853d6cad03922ba722f
-
SHA256
2a9e80e5a19f1c666250c72c7c5e23a3963f94d7e6ae132ef1e6aacf8d0ae792
-
SHA512
f15d9df99225ba4415d49fe9c68ab4579f075e79d200d6f59f3fc2f55892ac7c846d6f280f797db3e294b588c3a28a4551c99d72319256f38ff562ab3f4ee03b
-
SSDEEP
3072:lhMZA4+aeZZtfMcGUVhjB3eV9znPIzGOlnESUEdpa/3iO0Ehf+:XztftGUheV9bgzHBES5dpyts
Static task
static1
Behavioral task
behavioral1
Sample
b617896c55aa7c97f91a7bcc62c3c3ea_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b617896c55aa7c97f91a7bcc62c3c3ea_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
b617896c55aa7c97f91a7bcc62c3c3ea_JaffaCakes118
-
Size
172KB
-
MD5
b617896c55aa7c97f91a7bcc62c3c3ea
-
SHA1
252fe018613ca18c0918d853d6cad03922ba722f
-
SHA256
2a9e80e5a19f1c666250c72c7c5e23a3963f94d7e6ae132ef1e6aacf8d0ae792
-
SHA512
f15d9df99225ba4415d49fe9c68ab4579f075e79d200d6f59f3fc2f55892ac7c846d6f280f797db3e294b588c3a28a4551c99d72319256f38ff562ab3f4ee03b
-
SSDEEP
3072:lhMZA4+aeZZtfMcGUVhjB3eV9znPIzGOlnESUEdpa/3iO0Ehf+:XztftGUheV9bgzHBES5dpyts
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-