Analysis
-
max time kernel
141s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 18:33
Behavioral task
behavioral1
Sample
dafa6e66ab561fec8b16d01776e67b33_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dafa6e66ab561fec8b16d01776e67b33_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dafa6e66ab561fec8b16d01776e67b33_JaffaCakes118.exe
-
Size
4KB
-
MD5
dafa6e66ab561fec8b16d01776e67b33
-
SHA1
687c1de0c691a60748256a238d13bdfcbbaba7e1
-
SHA256
409e1be5fb129f97eaecf11df3d6bb103e9d1c75e9bc4faca38f7dfc456f0127
-
SHA512
a89cc12102d02a55a7808a4872d543de23f152a5820ca0fceb7546ae9dd40b55576de9692119d7c020e101267fbaf561af8d90c9495a194f476fea08de6436c6
-
SSDEEP
48:6/iS4V4MZtzBRQLMgF9dfnofG+54E9+YxsRGwapVRhrls6+aR6Xi6lqtGLdpBY2:+XAtzbQgu9dPG5DNxc9apbJBR6qtGrD
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_tcp_allports
193.34.2.1:10004
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.