General
-
Target
edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118
-
Size
170KB
-
Sample
240920-rj96ps1cnk
-
MD5
edc3b2e52d165b6c7beb50d591cba878
-
SHA1
1450e4f778dc6a68db89dd54c406dd8868d41f0a
-
SHA256
3d68cd3cd94edb3d4cc248294be736efb4673254175a28db1f04e4751b1479ac
-
SHA512
66cee0d2ca7613a4162db93e1f5e675a8972e5d73def01534b6272845bd64eec8f8408d7ca9cff7d34a332e539f2ea9a70af0b235ef8337ce8ea36188995f98d
-
SSDEEP
3072:M2nrY9mH+GU3hrGrGF2m0Y26SZUHK9ani4AOr/GaMl9gbUXAjNXXB99ueLK9er:brY973YiF2Tqni4AvarbOQR99uAyc
Static task
static1
Behavioral task
behavioral1
Sample
edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
edc3b2e52d165b6c7beb50d591cba878_JaffaCakes118
-
Size
170KB
-
MD5
edc3b2e52d165b6c7beb50d591cba878
-
SHA1
1450e4f778dc6a68db89dd54c406dd8868d41f0a
-
SHA256
3d68cd3cd94edb3d4cc248294be736efb4673254175a28db1f04e4751b1479ac
-
SHA512
66cee0d2ca7613a4162db93e1f5e675a8972e5d73def01534b6272845bd64eec8f8408d7ca9cff7d34a332e539f2ea9a70af0b235ef8337ce8ea36188995f98d
-
SSDEEP
3072:M2nrY9mH+GU3hrGrGF2m0Y26SZUHK9ani4AOr/GaMl9gbUXAjNXXB99ueLK9er:brY973YiF2Tqni4AvarbOQR99uAyc
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-