Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 12:21
Static task
static1
Behavioral task
behavioral1
Sample
eb52744d02d2a375f10baedd5a8917c6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb52744d02d2a375f10baedd5a8917c6_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb52744d02d2a375f10baedd5a8917c6_JaffaCakes118.exe
-
Size
85KB
-
MD5
eb52744d02d2a375f10baedd5a8917c6
-
SHA1
4aeb1ba0f6bacd6a21585aec6e90a131a88b25ba
-
SHA256
449bb50b5fb0ebc1384870c9fdd17ba1aba60e1387532b20bf0f97eae74b6f83
-
SHA512
1722bf8d597c79f6879b2eda754800c87ed6eb158505655c331ad6c5a30b38a1969ff8fb965b7e994f2937d7dae6b063324e9bc5ee7a51a6a84ede7efc860b33
-
SSDEEP
768:9k1BpLUfaR6cL2jbqTb/qNATN7j6F4KJe6R4ZU9qZU9y:9k1vLX3jTbySTu4+R4pl
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.1.5:5000
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb52744d02d2a375f10baedd5a8917c6_JaffaCakes118.exe