Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 07:34
Behavioral task
behavioral1
Sample
ed1d69d06257f3c5e5cefe4815b7600c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed1d69d06257f3c5e5cefe4815b7600c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed1d69d06257f3c5e5cefe4815b7600c_JaffaCakes118.exe
-
Size
1.6MB
-
MD5
ed1d69d06257f3c5e5cefe4815b7600c
-
SHA1
e56247fd66e243c7c52fd53439dc2f77efb2c7cd
-
SHA256
e10d79e6281250fc1ef43c106a5c0a06ae6a61ce496b60f8d30d61a18fd91e26
-
SHA512
3cd4499f8ea2b8d1e80913964da25d094f7a1e1420bbab48a211daf75218ad3836eba1f4cd3de1d8765d8a8c21f6a835780a2771bd2e74fedd1335c9535f6be3
-
SSDEEP
24576:zPf3haLo6eAVSm89e/uD2TNXn2zcgJ80yEi+4k2Dnabnpn1vzOe2V5jEXMMgMM9t:zPf3hmhlKJhi+VVbp1vzOe2QMMgMM9Z
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed1d69d06257f3c5e5cefe4815b7600c_JaffaCakes118.exe