Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 02:26
Behavioral task
behavioral1
Sample
d97488bf1862a1a2643f87831689b374_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d97488bf1862a1a2643f87831689b374_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d97488bf1862a1a2643f87831689b374_JaffaCakes118.exe
-
Size
4KB
-
MD5
d97488bf1862a1a2643f87831689b374
-
SHA1
5a263df57da17cd1a507f4a149ac5b5ca9a2facc
-
SHA256
de74e218f9c70c275923746112a672cf6ac9438083eb0b55afbc79645462364f
-
SHA512
1f66a83e495f2e0fef8ed6482fb6039d60eaa6987ffa960ccd2a773815e9b51838064c2ea20cacdbdf6f8ff7c36482c5059a35564161281444e4e77a2a97598d
-
SSDEEP
48:6piY7Pb59wWhxNC48aVjViTfmiFZjSzXNWWqHu/iq1lxrRP9W25frpOBBQ:wzteWhSVaV4FJSds+XftPI2FYLQ
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.4.25:31337
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.