General
-
Target
e1823355ebb918b77c266589cd6d05a6_JaffaCakes118
-
Size
48KB
-
Sample
240915-cpyyaszhrr
-
MD5
e1823355ebb918b77c266589cd6d05a6
-
SHA1
372f7bdc0a680afa97ff888fac602d561b701737
-
SHA256
57cf2366351bc0cbf4dfcfb033ff704263fe4550f46df05c8e4fbe3cb010bed9
-
SHA512
9a825dd552cdfff9f78a2726cedf453f199f9087b77155c100a270e9cb1a7381f59ab19d3a735459eddde142d7626be6322ad18714c084e06a240eeb889b924e
-
SSDEEP
768:HR/KhRV17RfsWh8Bu1nfLBTR37rkn3g3R7Hj9iZMbfA0AW:h4V17/2BOfDrk3YpnAW
Static task
static1
Behavioral task
behavioral1
Sample
e1823355ebb918b77c266589cd6d05a6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e1823355ebb918b77c266589cd6d05a6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
e1823355ebb918b77c266589cd6d05a6_JaffaCakes118
-
Size
48KB
-
MD5
e1823355ebb918b77c266589cd6d05a6
-
SHA1
372f7bdc0a680afa97ff888fac602d561b701737
-
SHA256
57cf2366351bc0cbf4dfcfb033ff704263fe4550f46df05c8e4fbe3cb010bed9
-
SHA512
9a825dd552cdfff9f78a2726cedf453f199f9087b77155c100a270e9cb1a7381f59ab19d3a735459eddde142d7626be6322ad18714c084e06a240eeb889b924e
-
SSDEEP
768:HR/KhRV17RfsWh8Bu1nfLBTR37rkn3g3R7Hj9iZMbfA0AW:h4V17/2BOfDrk3YpnAW
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-