General
-
Target
ef9de89214c6f038136bf5cb414af879_JaffaCakes118
-
Size
195KB
-
Sample
240921-mq2qpaybjl
-
MD5
ef9de89214c6f038136bf5cb414af879
-
SHA1
be522254b5af0d514ed54f896bfc1b824531e9d0
-
SHA256
9141333a7c5355eda35613bf0487fe46ae41fe5f30c4850aabdedb66836ef83a
-
SHA512
6fd3a58dddac241ae174d7604d0b6d102c9ab4726968c67db1ca437afad43ac9f1aab5436011685b5208d86dd83ffa07f8e1e2e31849a5cccb6c2939ba381c5f
-
SSDEEP
3072:d24Kn1kPaKZ/5+LepB2r+qL+tJToNoYxvIKMZNYOC7hnRRT6d:j+kPaKZ7urlL+3oJ5IKOap71D6d
Static task
static1
Behavioral task
behavioral1
Sample
ef9de89214c6f038136bf5cb414af879_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef9de89214c6f038136bf5cb414af879_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
ef9de89214c6f038136bf5cb414af879_JaffaCakes118
-
Size
195KB
-
MD5
ef9de89214c6f038136bf5cb414af879
-
SHA1
be522254b5af0d514ed54f896bfc1b824531e9d0
-
SHA256
9141333a7c5355eda35613bf0487fe46ae41fe5f30c4850aabdedb66836ef83a
-
SHA512
6fd3a58dddac241ae174d7604d0b6d102c9ab4726968c67db1ca437afad43ac9f1aab5436011685b5208d86dd83ffa07f8e1e2e31849a5cccb6c2939ba381c5f
-
SSDEEP
3072:d24Kn1kPaKZ/5+LepB2r+qL+tJToNoYxvIKMZNYOC7hnRRT6d:j+kPaKZ7urlL+3oJ5IKOap71D6d
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-