General
-
Target
dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118
-
Size
296KB
-
Sample
240912-nvdp4atejh
-
MD5
dc40396ba7a60db040dc0cc8a5f50b62
-
SHA1
4aa7f692e7b19338932785e403bb1a798552f2fa
-
SHA256
2115f6f9e274b823456ef662cc6b511952596e82c908738da0e2dca57d8550b0
-
SHA512
5c8bcd36508fb95b0e048c3ebdf196a33fd30307b207dbd965dc6fddfe1568df9114172cffe637605c7cab42b58fcb713091c7f7e923dde3a1aaf4d3b4c9f28b
-
SSDEEP
3072:j7g00jC8lIT5EDwVLRfbAfmQWJg+1R5xUxb3P0QgcsHkxw/////////////////5:Y00jC8lIKyLt8WCtx7M3cYk
Static task
static1
Behavioral task
behavioral1
Sample
dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
dc40396ba7a60db040dc0cc8a5f50b62_JaffaCakes118
-
Size
296KB
-
MD5
dc40396ba7a60db040dc0cc8a5f50b62
-
SHA1
4aa7f692e7b19338932785e403bb1a798552f2fa
-
SHA256
2115f6f9e274b823456ef662cc6b511952596e82c908738da0e2dca57d8550b0
-
SHA512
5c8bcd36508fb95b0e048c3ebdf196a33fd30307b207dbd965dc6fddfe1568df9114172cffe637605c7cab42b58fcb713091c7f7e923dde3a1aaf4d3b4c9f28b
-
SSDEEP
3072:j7g00jC8lIT5EDwVLRfbAfmQWJg+1R5xUxb3P0QgcsHkxw/////////////////5:Y00jC8lIKyLt8WCtx7M3cYk
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-