Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    22-09-2024 14:44

General

  • Target

    f2390da7c61659da35a26d714f291615_JaffaCakes118.exe

  • Size

    72KB

  • MD5

    f2390da7c61659da35a26d714f291615

  • SHA1

    0cad1a82bd3359e67a2cfec56de280983e1f38ef

  • SHA256

    64975d3236568f1da210fa7500526e72219def9ce2abcd1d6daca8a0a50dce37

  • SHA512

    a204fd9357ef1f8880e7bdc4c544fa7c8e7e2716c3ff53fa50d8f5dc544d6488f1fac4d8e4bc02e7eb2d8f265f3f8f60dba9314e6b101dd2a1811f75b3a9e0ef

  • SSDEEP

    1536:I3uMG7tsVxE3GxJ9ZXAlMB61Y2xhA/dIss3Mb+KR0Nc8QsJq39:Uuh3Grw2BDess3e0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f2390da7c61659da35a26d714f291615_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f2390da7c61659da35a26d714f291615_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2204

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2204-0-0x0000000000020000-0x0000000000021000-memory.dmp

    Filesize

    4KB