General
-
Target
bd7ab7d3832064d0e80c15ff3225f7fe_JaffaCakes118
-
Size
74KB
-
Sample
240823-2splga1hjc
-
MD5
bd7ab7d3832064d0e80c15ff3225f7fe
-
SHA1
5f54e10f92dd99f28cfccafb3ef92f621162827e
-
SHA256
1c59a36d5f9dc05f0ebce9d47b689d0b2d41065b1244c91316ce437bddcfe474
-
SHA512
b05dfab22c44b94bbfa913b12f79b1ca7b73f3271f643bc05264f91ed39166b0f9ffa50cc8f08cb2c5faa66adce11175f9cd04fa042c1252073f170f221259e1
-
SSDEEP
768:/8DyqFxZBTlC3OKCrDM+WRxidXbkSZn02oS0oM8HJWAEwVbGx:/OZwYg+WPwXbS2oS0oM84AEwVax
Static task
static1
Behavioral task
behavioral1
Sample
bd7ab7d3832064d0e80c15ff3225f7fe_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd7ab7d3832064d0e80c15ff3225f7fe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
bd7ab7d3832064d0e80c15ff3225f7fe_JaffaCakes118
-
Size
74KB
-
MD5
bd7ab7d3832064d0e80c15ff3225f7fe
-
SHA1
5f54e10f92dd99f28cfccafb3ef92f621162827e
-
SHA256
1c59a36d5f9dc05f0ebce9d47b689d0b2d41065b1244c91316ce437bddcfe474
-
SHA512
b05dfab22c44b94bbfa913b12f79b1ca7b73f3271f643bc05264f91ed39166b0f9ffa50cc8f08cb2c5faa66adce11175f9cd04fa042c1252073f170f221259e1
-
SSDEEP
768:/8DyqFxZBTlC3OKCrDM+WRxidXbkSZn02oS0oM8HJWAEwVbGx:/OZwYg+WPwXbS2oS0oM84AEwVax
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service
-
Modifies security service
-
Drops file in Drivers directory
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-