Analysis
-
max time kernel
94s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 17:15
Static task
static1
Behavioral task
behavioral1
Sample
e53cc59cb392a14a3c3658e4a1b52e9b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e53cc59cb392a14a3c3658e4a1b52e9b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e53cc59cb392a14a3c3658e4a1b52e9b_JaffaCakes118.exe
-
Size
55KB
-
MD5
e53cc59cb392a14a3c3658e4a1b52e9b
-
SHA1
e331c8add857ae00a470ffdb6f4650eface72972
-
SHA256
d905adff8bf8b77194d5ebc7f70604f00619c420f1a37cbd85e5a882d3fae3f8
-
SHA512
dac01749c8fea6e581e2171f6f907b2e7d876a1c02a8ea881676b27b4777fa40a8a88dba593f3c2cbd1b48e46265c236039b6136e63cb0a97289b1480eb081c3
-
SSDEEP
1536:PK2rg5p+Y/WgRsoT5AKLnkIjrZlMunSbdp1bR7:PKUQTOgRltLn3Y3vbR7
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e53cc59cb392a14a3c3658e4a1b52e9b_JaffaCakes118.exe