General
-
Target
f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118
-
Size
141KB
-
Sample
240923-vn9braxera
-
MD5
f2bd14f1d5fbdab0fe21832ba8aec524
-
SHA1
7290ed270c3db66c72cf23bffba7955183a7272c
-
SHA256
e2051785e5c2f3ba3bc05aec0442af3b899246ecc3dc836b8a187f91d986c33e
-
SHA512
c8f761359be804b4a76df9a07e4ec90bb9188d881fabacd90fce91bf18dc9812d8799bfb4e519fcb31ee53f768373a2dc5b99ab779a9634507ce1b473a67852d
-
SSDEEP
3072:BxmEvcelB7KX/t/6bOe1075aNFIULlAxCyWmzvStMEGt3NxhBenjYDr:e27e1c0daNFIa26mzvSq3NsYv
Static task
static1
Behavioral task
behavioral1
Sample
f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
f2bd14f1d5fbdab0fe21832ba8aec524_JaffaCakes118
-
Size
141KB
-
MD5
f2bd14f1d5fbdab0fe21832ba8aec524
-
SHA1
7290ed270c3db66c72cf23bffba7955183a7272c
-
SHA256
e2051785e5c2f3ba3bc05aec0442af3b899246ecc3dc836b8a187f91d986c33e
-
SHA512
c8f761359be804b4a76df9a07e4ec90bb9188d881fabacd90fce91bf18dc9812d8799bfb4e519fcb31ee53f768373a2dc5b99ab779a9634507ce1b473a67852d
-
SSDEEP
3072:BxmEvcelB7KX/t/6bOe1075aNFIULlAxCyWmzvStMEGt3NxhBenjYDr:e27e1c0daNFIa26mzvSq3NsYv
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-