General
-
Target
d22de912120d5f376a2da35ac85f8f2f_JaffaCakes118
-
Size
112KB
-
Sample
240907-r5d1ds1crh
-
MD5
d22de912120d5f376a2da35ac85f8f2f
-
SHA1
7755ade14441657b202920176ca17fc3f768b58f
-
SHA256
a67b3f197673f7bdeaab0cb1890f04b430a2fade09e6aaabbdca27736918d919
-
SHA512
cdabf3d31a46b8000b47f171304869f4bf97db7807d53cfca03df479fe8ccc1a2fe8057bde6a5625bdb53e1f5cee82b2a45d76cb7fa643bd410d539b1516f00b
-
SSDEEP
1536:Ui72yqBfbl107wf8mxiuq28OSeGUWbEez/DaY0mEGrY4LKacoUcW6ba6S3rm:Tt8MwXxBX8OSel5eImEGr1Lc8W6bNei
Static task
static1
Behavioral task
behavioral1
Sample
d22de912120d5f376a2da35ac85f8f2f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d22de912120d5f376a2da35ac85f8f2f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
d22de912120d5f376a2da35ac85f8f2f_JaffaCakes118
-
Size
112KB
-
MD5
d22de912120d5f376a2da35ac85f8f2f
-
SHA1
7755ade14441657b202920176ca17fc3f768b58f
-
SHA256
a67b3f197673f7bdeaab0cb1890f04b430a2fade09e6aaabbdca27736918d919
-
SHA512
cdabf3d31a46b8000b47f171304869f4bf97db7807d53cfca03df479fe8ccc1a2fe8057bde6a5625bdb53e1f5cee82b2a45d76cb7fa643bd410d539b1516f00b
-
SSDEEP
1536:Ui72yqBfbl107wf8mxiuq28OSeGUWbEez/DaY0mEGrY4LKacoUcW6ba6S3rm:Tt8MwXxBX8OSel5eImEGr1Lc8W6bNei
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-