Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 23:52
Behavioral task
behavioral1
Sample
ce2fae976455bc46970afe3d82a72b0f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ce2fae976455bc46970afe3d82a72b0f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce2fae976455bc46970afe3d82a72b0f_JaffaCakes118.exe
-
Size
72KB
-
MD5
ce2fae976455bc46970afe3d82a72b0f
-
SHA1
7bf545f3df807680e8cdfbe656976fd7f6aaa128
-
SHA256
4b2d04b7fc980e665a7af19654196830e9fd951410ba64a4ee91542838a3aab5
-
SHA512
53093161ed6df2aa0558339b2eb9f19b235bfe6ae420fbc1da3c1e370292705db59c6b901a25f69bca5b6687e16a270c96d8868c2ebaaa17c06f4df1cd8ace8e
-
SSDEEP
1536:Inlr+jeTERiT8YB/4BWDoiMb+KR0Nc8QsJq39:elK6SiTCWDoie0Nc8QsC9
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.101.91:8080
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce2fae976455bc46970afe3d82a72b0f_JaffaCakes118.exe