Analysis

  • max time kernel
    120s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    18-09-2024 08:00

General

  • Target

    e8a9cd4a748c8909881649a02cdebf50_JaffaCakes118.exe

  • Size

    28KB

  • MD5

    e8a9cd4a748c8909881649a02cdebf50

  • SHA1

    6b58f68dcef2d25cf3fa20edc1aeb8a61903d411

  • SHA256

    d7fe02a82b7590ced0796ccbaf5b4c461fb7daea7d5bd423b6ed4dfaa16d452e

  • SHA512

    2119a471da216e362437c2c837591636e87867ced86b37a83c5554206340c03064b1298454a14eea27db0a37c737513a5918d1980f59a7ff2dd198f57ce5880a

  • SSDEEP

    384:zFkdKGgcIpbShNChv33dzeG6U2UqnmmVmxc0rBUMc+XvAbJj2yiiBkh5s:hkqShU99zh60qTVmxcv1+XvAZ2Sv

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8a9cd4a748c8909881649a02cdebf50_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e8a9cd4a748c8909881649a02cdebf50_JaffaCakes118.exe"
    1⤵
      PID:1640

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1640-0-0x0000000000400000-0x0000000000409000-memory.dmp

      Filesize

      36KB