Analysis
-
max time kernel
98s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
16-09-2024 18:40
Static task
static1
Behavioral task
behavioral1
Sample
e5606df72b02c81e2208195843dbf4e2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e5606df72b02c81e2208195843dbf4e2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e5606df72b02c81e2208195843dbf4e2_JaffaCakes118.exe
-
Size
48KB
-
MD5
e5606df72b02c81e2208195843dbf4e2
-
SHA1
508cf45b74bc69227a2b7185823d0b9418ce4651
-
SHA256
14317d5fe5bdee3dba82069f26fb1d8fe8172bd2deeac2b653249fc9cf4831e4
-
SHA512
f3e0a0d142483c1d00ab2ab62475e7b13ee9418390de033b694f76550ac754e4c976e0aa9f6d21518371cee53b69aaa785f01a64e30126c08ffd1197031666f0
-
SSDEEP
1536:2F0GoyKmGfEBXrB3H4RkiDX1l04Gkz4T:vvNmGcPH4R7DH04tET
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5606df72b02c81e2208195843dbf4e2_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3796 e5606df72b02c81e2208195843dbf4e2_JaffaCakes118.exe