Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 21:33
Static task
static1
Behavioral task
behavioral1
Sample
e3661b92e29dc56f3cbd4e623c1301d3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3661b92e29dc56f3cbd4e623c1301d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e3661b92e29dc56f3cbd4e623c1301d3_JaffaCakes118.exe
-
Size
381KB
-
MD5
e3661b92e29dc56f3cbd4e623c1301d3
-
SHA1
21d9d01ccb2ce6cf764d0aaf390c5d3fab550b23
-
SHA256
31e5ab9625904b9632b310a8462b884f83f5336da9739b762a7d2847e9af8fec
-
SHA512
e07c1addb92e8acaf1b3d17a15fca94c25b525f4080f7fff3ad949e6335b24fc797ddb330af5cf9426d8b5cd4c95b736e00d370cdc2a704a1ae43ea767651c09
-
SSDEEP
6144:HRv7OZlopJz5ISky3q3w9B6vGGLT2s3tm+6xSFgOQkfqf9bp:976lopDl4w9B6Oqc+6xIg9kC9bp
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e3661b92e29dc56f3cbd4e623c1301d3_JaffaCakes118.exe