Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 11:37
Behavioral task
behavioral1
Sample
efb5ac936f69115a770735e8deb98b31_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
efb5ac936f69115a770735e8deb98b31_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
efb5ac936f69115a770735e8deb98b31_JaffaCakes118.exe
-
Size
72KB
-
MD5
efb5ac936f69115a770735e8deb98b31
-
SHA1
9da3f77a85354dd458152d13a3cde93c811c4715
-
SHA256
139c09061fb34183d0ba01a5b0aded81016eefad9d38ca46dfff0c5666695cef
-
SHA512
546b49a5acbf5076d6ad5a07df4116a9edc78ed092dc8ac6dafb32ad51d376cb31dea04251f82e8ef41afb0f37065a5b32922e04b7d4d9da464c6993f0ced760
-
SSDEEP
1536:IW83PZKe3d2RBFjKidWDRmuovNrMb+KR0Nc8Qs:n8RT8RfmfDsVre0Nc8Qs
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.