General
-
Target
e13376dec97e28d51aa80f68b7860849_JaffaCakes118
-
Size
1.2MB
-
Sample
240914-2v4s6s1gjr
-
MD5
e13376dec97e28d51aa80f68b7860849
-
SHA1
8a98aa1ff246723bee0d5d307ab69f20a61a1c09
-
SHA256
dfc5874e79146257ff910942b6a7801ea92638086558ff2bb7f77d6e8209f2e3
-
SHA512
cb5e1bb199b143c5ec5cf220c2701b0b4a07c3766fbe352440dfceefa12c105c9de668336608750b9d300a52599e8e931a36f033aeb95a2491129f5f985a97eb
-
SSDEEP
12288:MDeq6XQ2xIjrwg8d+G6e2S5Est12EUEYO27NUvLFyImxAuTdmsi:Mn5rwgxG6TSPGEU7VqvLFyInadms
Static task
static1
Behavioral task
behavioral1
Sample
e13376dec97e28d51aa80f68b7860849_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
e13376dec97e28d51aa80f68b7860849_JaffaCakes118
-
Size
1.2MB
-
MD5
e13376dec97e28d51aa80f68b7860849
-
SHA1
8a98aa1ff246723bee0d5d307ab69f20a61a1c09
-
SHA256
dfc5874e79146257ff910942b6a7801ea92638086558ff2bb7f77d6e8209f2e3
-
SHA512
cb5e1bb199b143c5ec5cf220c2701b0b4a07c3766fbe352440dfceefa12c105c9de668336608750b9d300a52599e8e931a36f033aeb95a2491129f5f985a97eb
-
SSDEEP
12288:MDeq6XQ2xIjrwg8d+G6e2S5Est12EUEYO27NUvLFyImxAuTdmsi:Mn5rwgxG6TSPGEU7VqvLFyInadms
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies firewall policy service
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Deletes itself
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
MITRE ATT&CK Enterprise v15
Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
1