Analysis

  • max time kernel
    120s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-09-2024 04:53

General

  • Target

    f1517d1738c5eeb81ab5ee543162297a_JaffaCakes118.exe

  • Size

    72KB

  • MD5

    f1517d1738c5eeb81ab5ee543162297a

  • SHA1

    c52143b7ac85b918ca84a41233c6ab51f7193eff

  • SHA256

    32f81b203997083f29cca0fdf4a01998e212a81117503f4b807ace51dd1c6411

  • SHA512

    a3187535edd9b0a9653c05363c834141fa0abfa77f5247a1c28420f9229893fa4ad70caca1f189774c383fe08cb4aa9650415e99a70a770d49b79ecf01b1a40b

  • SSDEEP

    1536:ILl21IfP+Ps2sKFhiDWy+k8C/8wVMb+KR0Nc8QsJq39:pIH+PJ72J+k8C02e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f1517d1738c5eeb81ab5ee543162297a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f1517d1738c5eeb81ab5ee543162297a_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3680-0-0x0000000000880000-0x0000000000881000-memory.dmp

    Filesize

    4KB