General
-
Target
dcfd8de90c3200e5a2e46411ea2def3c_JaffaCakes118
-
Size
149KB
-
Sample
240912-y6x8zstane
-
MD5
dcfd8de90c3200e5a2e46411ea2def3c
-
SHA1
fe5f3a1fdd3dff05144db389c8e183831a8dc975
-
SHA256
52b7fc761672109700f6f4c30535568dc0d0eeac8e50e7fc1de17a62bde95587
-
SHA512
0e9eda21498f5adf1cbcc9d987e55fdce833969453816aa3a31f262cddfcc0ec61a73ffee100d07bda4ac8711f77996ce6d69e4b675cd4f7ad82086f2ecb99b3
-
SSDEEP
3072:Cm/HyUM23BDfak2+PQNgwq3BykCBua7mLiT7GKPPsqETsxB:n/DMg8f1dq3BCBuugiTCKP7j
Static task
static1
Behavioral task
behavioral1
Sample
dcfd8de90c3200e5a2e46411ea2def3c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dcfd8de90c3200e5a2e46411ea2def3c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
dcfd8de90c3200e5a2e46411ea2def3c_JaffaCakes118
-
Size
149KB
-
MD5
dcfd8de90c3200e5a2e46411ea2def3c
-
SHA1
fe5f3a1fdd3dff05144db389c8e183831a8dc975
-
SHA256
52b7fc761672109700f6f4c30535568dc0d0eeac8e50e7fc1de17a62bde95587
-
SHA512
0e9eda21498f5adf1cbcc9d987e55fdce833969453816aa3a31f262cddfcc0ec61a73ffee100d07bda4ac8711f77996ce6d69e4b675cd4f7ad82086f2ecb99b3
-
SSDEEP
3072:Cm/HyUM23BDfak2+PQNgwq3BykCBua7mLiT7GKPPsqETsxB:n/DMg8f1dq3BCBuugiTCKP7j
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-