Analysis
-
max time kernel
106s -
max time network
94s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 13:53
Behavioral task
behavioral1
Sample
edbb24414bdd39c490417a03893e9a68_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
edbb24414bdd39c490417a03893e9a68_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
edbb24414bdd39c490417a03893e9a68_JaffaCakes118.exe
-
Size
109KB
-
MD5
edbb24414bdd39c490417a03893e9a68
-
SHA1
748b9f26dfb701560b8c05e8295ad87cffb81ec2
-
SHA256
3ce866a3496b3b8bd4d35f017f04fb2bbcc2d7b4f204b5119844d9704a2f75b4
-
SHA512
0c2bca0e1dff561d862733c688d7b5a608cb860f6c94961b8c1afc4e1b9ce5173d58c1460a0810ad05fcbacf665cf3465db529e2e7f839a0ccd29452e1798c92
-
SSDEEP
1536:6w3wVFVQdTEva0PIsGd7L3HfbRsKyW1iQ99HVDnf3SLlyW7PvT7GP0vIkxtnG/Ed:O
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.