General
-
Target
bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118
-
Size
106KB
-
Sample
240823-qtwwdszajq
-
MD5
bbf0c8b10e3f739f2bd1cc3abbe6b073
-
SHA1
19cb15692e8a674421821f58f6bed4160744ed73
-
SHA256
339daf7546bbaae7cf03222ab127d726bca8f2435ed4465a7f381b0ec417c82e
-
SHA512
d11e088d2a0e46fb75a78ffb1e8639ad4eb97234f253ad0b6c96eb302e396b554111aeb720e434d19ee0d2dc10768fca7a26c48d6b1e834b26594675fd691e1e
-
SSDEEP
3072:P5a0pGtk+Rd2p2CXiOzgl2IwLFMnoggfRuv3:xa0EtoiKgl2IwLKndgJuv3
Static task
static1
Behavioral task
behavioral1
Sample
bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
bbf0c8b10e3f739f2bd1cc3abbe6b073_JaffaCakes118
-
Size
106KB
-
MD5
bbf0c8b10e3f739f2bd1cc3abbe6b073
-
SHA1
19cb15692e8a674421821f58f6bed4160744ed73
-
SHA256
339daf7546bbaae7cf03222ab127d726bca8f2435ed4465a7f381b0ec417c82e
-
SHA512
d11e088d2a0e46fb75a78ffb1e8639ad4eb97234f253ad0b6c96eb302e396b554111aeb720e434d19ee0d2dc10768fca7a26c48d6b1e834b26594675fd691e1e
-
SSDEEP
3072:P5a0pGtk+Rd2p2CXiOzgl2IwLFMnoggfRuv3:xa0EtoiKgl2IwLKndgJuv3
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-