General
-
Target
d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118
-
Size
154KB
-
Sample
240910-gmqalayhqn
-
MD5
d7aced5edc6532c16991a1e8c5873d40
-
SHA1
61580e4d3fe2ec1385e2352d51967ce6a5d5da1c
-
SHA256
c999634888d1c08817538f4171e0cb75cfe4831d56d02d87cadd8a5cf2aa4e45
-
SHA512
57a6fd6ba5306c4168572b2b58a8d573a31981ce7f7b237b22592a8725b9a1aa8af6868976c3622c4c31fe94cc8547cddab44f7571c004a17380d285ace6e60e
-
SSDEEP
3072:jMPrpmjM78IWjdJWZdSleKY5MG0inih23hGB2odHwQxswNoqMbFNh:jKyIWJS+49vnXhGB2C3swUt
Static task
static1
Behavioral task
behavioral1
Sample
d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
d7aced5edc6532c16991a1e8c5873d40_JaffaCakes118
-
Size
154KB
-
MD5
d7aced5edc6532c16991a1e8c5873d40
-
SHA1
61580e4d3fe2ec1385e2352d51967ce6a5d5da1c
-
SHA256
c999634888d1c08817538f4171e0cb75cfe4831d56d02d87cadd8a5cf2aa4e45
-
SHA512
57a6fd6ba5306c4168572b2b58a8d573a31981ce7f7b237b22592a8725b9a1aa8af6868976c3622c4c31fe94cc8547cddab44f7571c004a17380d285ace6e60e
-
SSDEEP
3072:jMPrpmjM78IWjdJWZdSleKY5MG0inih23hGB2odHwQxswNoqMbFNh:jKyIWJS+49vnXhGB2C3swUt
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-