Analysis
-
max time kernel
105s -
max time network
98s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-09-2024 17:55
Behavioral task
behavioral1
Sample
f287dc35fccaf3fb891f356b43e3d4f5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f287dc35fccaf3fb891f356b43e3d4f5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f287dc35fccaf3fb891f356b43e3d4f5_JaffaCakes118.exe
-
Size
72KB
-
MD5
f287dc35fccaf3fb891f356b43e3d4f5
-
SHA1
8d5e41304d3168ed22748fcd24c9e6771609b4fb
-
SHA256
609b2394b7e475bc588cb7f16fd8810e57985c3f6196a2ea52217e995be57bf9
-
SHA512
f91a27cbffa9eaa38bf9b148250daf065c69c26b97087f825781f6a0856907ff2f1d87a5b82305952fccbc19e6d4cca75d7fa78e796b38d75ea86556deb043d6
-
SSDEEP
1536:IE0GuKBuqc/pPXIha4BBVuAKMMb+KR0Nc8QsJq39:50CA9IrdBe0Nc8QsC9
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.1.7:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f287dc35fccaf3fb891f356b43e3d4f5_JaffaCakes118.exe