Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 05:59
Static task
static1
Behavioral task
behavioral1
Sample
e62f7975b554bac58cc9280c632a31dc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e62f7975b554bac58cc9280c632a31dc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e62f7975b554bac58cc9280c632a31dc_JaffaCakes118.exe
-
Size
46KB
-
MD5
e62f7975b554bac58cc9280c632a31dc
-
SHA1
833f93f5e1c0e7720c46d254a05979c9d65b63c9
-
SHA256
0547ef2b6dd1316e9b494af8cf167941d4493993799a266339d4cbb515a9b799
-
SHA512
6592ad1cd936179e1a5d65683324fc536cc53afb9eb06c35db08c45b7a1bb18f511cbe9ee6bfd45872752468a43faa37786f3b75a34e4386d5e7241ceff4e8ca
-
SSDEEP
768:IqF+cE2WXoulPkgKCiFQULIs45yLAifc5ioGWgoF5IraG8t0sSKvsk2Rq3:Iq5EJnl8XCiKUoANc5HGB+er/wPB+q3
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
58.124.238.136:444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e62f7975b554bac58cc9280c632a31dc_JaffaCakes118.exe