General
-
Target
e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118
-
Size
142KB
-
Sample
240915-dtq9pataqe
-
MD5
e19a22e76089eb77565c7fd8f685b88b
-
SHA1
ae012a2b0a19aa837a841e1f63beb99024c8999a
-
SHA256
6219e4ec2189499c1ea6307e2578ea3d64a62550bc7206dd8d2ce507f5e2f556
-
SHA512
2bb642c3a0a47df8eab47d09530347ccd9e9a97864cff0bee5c09da6bf1d56ffe2d41f718443c28e12592784ab36367b9994bb97fff2f5911a6041076e8a7d51
-
SSDEEP
3072:evEZzUAal8HNu2dY5g5E+K4DBKwAsVMvMjWdpB6D2HgYDm:eCzBHN3b5EsdKdPvpBXu
Static task
static1
Behavioral task
behavioral1
Sample
e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
e19a22e76089eb77565c7fd8f685b88b_JaffaCakes118
-
Size
142KB
-
MD5
e19a22e76089eb77565c7fd8f685b88b
-
SHA1
ae012a2b0a19aa837a841e1f63beb99024c8999a
-
SHA256
6219e4ec2189499c1ea6307e2578ea3d64a62550bc7206dd8d2ce507f5e2f556
-
SHA512
2bb642c3a0a47df8eab47d09530347ccd9e9a97864cff0bee5c09da6bf1d56ffe2d41f718443c28e12592784ab36367b9994bb97fff2f5911a6041076e8a7d51
-
SSDEEP
3072:evEZzUAal8HNu2dY5g5E+K4DBKwAsVMvMjWdpB6D2HgYDm:eCzBHN3b5EsdKdPvpBXu
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-