General
-
Target
e23157efe041a73c68ceaf2b5074db65_JaffaCakes118
-
Size
173KB
-
Sample
240915-lpkkcaxgpp
-
MD5
e23157efe041a73c68ceaf2b5074db65
-
SHA1
f5f8ee6414e5fd16bdf602dbf6963403986e2273
-
SHA256
9300d6b3aa972e79da286df5b1cb3345529cf2d1cbf09c2e7f7e38e096e48ac5
-
SHA512
80f96914831985adb1c5db6227c98d7f6b9aa12a884b0930ca1a0e0551f901b1e89e9af4b4eb7e2cff468e0e246964d1edf389d366cc95f24ca2e4c1d9a3f423
-
SSDEEP
3072:UnnA9CEAi+ylfLDtS/SkBgLAhrjLD12WpciDMa2t5tpmhpAUAC5XQ7M:UcCPI8ZeEJ128972/tpC/ASQ7M
Static task
static1
Behavioral task
behavioral1
Sample
e23157efe041a73c68ceaf2b5074db65_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e23157efe041a73c68ceaf2b5074db65_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
e23157efe041a73c68ceaf2b5074db65_JaffaCakes118
-
Size
173KB
-
MD5
e23157efe041a73c68ceaf2b5074db65
-
SHA1
f5f8ee6414e5fd16bdf602dbf6963403986e2273
-
SHA256
9300d6b3aa972e79da286df5b1cb3345529cf2d1cbf09c2e7f7e38e096e48ac5
-
SHA512
80f96914831985adb1c5db6227c98d7f6b9aa12a884b0930ca1a0e0551f901b1e89e9af4b4eb7e2cff468e0e246964d1edf389d366cc95f24ca2e4c1d9a3f423
-
SSDEEP
3072:UnnA9CEAi+ylfLDtS/SkBgLAhrjLD12WpciDMa2t5tpmhpAUAC5XQ7M:UcCPI8ZeEJ128972/tpC/ASQ7M
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-