General
-
Target
d98897a487409f8cd6685ab1921e5418_JaffaCakes118
-
Size
128KB
-
Sample
240911-d15ewszenr
-
MD5
d98897a487409f8cd6685ab1921e5418
-
SHA1
4c5fcbba7df9350bb29e9a266303c4a151036594
-
SHA256
82ee79c546a05eb714e747aa0b9c9bb9fb551fa72fff7479ad35d7e764a1f174
-
SHA512
eeaf11632b3dab7b0072bd8cf89cd89e4f76e98e38dd15085d9d9e34cd423be83bfcf3ed15e0b91d2a083ed1730242cda3bbbd0dfa4c8a6057d92353c2178086
-
SSDEEP
3072:p3ACkdLfeE8yRdBRfe5EmjlYRELmU0bi0q2qnLLxHWtGoi4Df:xB8eXuRfe5EFRELmUki0SLNH69f
Static task
static1
Behavioral task
behavioral1
Sample
Picture29.JPG_www.facebook.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Picture29.JPG_www.facebook.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
Picture29.JPG_www.facebook.com
-
Size
139KB
-
MD5
255a2ff8712b8def6c7cd7b49afcf277
-
SHA1
7da7443a4ecad24887adcbc7d80b13dedea7c798
-
SHA256
29b37b7786abf5cf93cbdd9fe776975fe02aaa380ffb2045087b36711c1cc996
-
SHA512
c35369f5ac54e8d2d2e75cf9f079d6fcd961de54f3a563e5abda3ca531a183128eead4c75952d4e0e04c2e1d36eb694148630348826af9d2eacd83bb62996e05
-
SSDEEP
3072:P92aolTgOIShudBRfe5EmjlYRELmU0bi0q2qnaKWE:FXO0Rfe5EFRELmUki0SaKWE
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-