Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 16:20
Behavioral task
behavioral1
Sample
e738973d3c3917c04706d5d61d99f7b9_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e738973d3c3917c04706d5d61d99f7b9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e738973d3c3917c04706d5d61d99f7b9_JaffaCakes118.exe
-
Size
68KB
-
MD5
e738973d3c3917c04706d5d61d99f7b9
-
SHA1
4a5b5dcccce79d9da3fafe36a899c9f1a49dacb8
-
SHA256
097cde6bc87ceb420f54b0bbaba44810b3f87243e1a74f5ea4899e6e9ac00012
-
SHA512
496e4e31f14b65308ad887430c834b59d0b80f7edee52766ab8d4bd7680e1fa1200112174f1db5e2506e4d93cfcda645126b5fb922116bd63f3e5baba1081eb7
-
SSDEEP
1536:RpCGMDcw+KcIitHow0uxKe0Re/JUEbooPRrKKRjV/s8v:RpCjc5IijPK1Re/JltZrpRp/sS
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.0.105:445
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e738973d3c3917c04706d5d61d99f7b9_JaffaCakes118.exe