Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 23:11
Behavioral task
behavioral1
Sample
f70ab39ef63b1e7bfeefbe2d40c02c6f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f70ab39ef63b1e7bfeefbe2d40c02c6f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f70ab39ef63b1e7bfeefbe2d40c02c6f_JaffaCakes118.exe
-
Size
67KB
-
MD5
f70ab39ef63b1e7bfeefbe2d40c02c6f
-
SHA1
cf00468a8283c5183ea616f2ddc161a864ad1363
-
SHA256
e0f2361ed44e49234f169362b20d5e8c64c42cbab3866a5e86290acac8cf4492
-
SHA512
f711da8bd1797a4a40ac6868baf802140cac1fa7011da3a2ae16f977647e0d97b399fc4e33db1548650c69a660a800327cfa74870c593a69ef0b5ba8cf098c9e
-
SSDEEP
1536:aVRtkBsc05qrucF4VMI0foMJUEbooPRrKKReFX3:atkuci2I0fFJltZrpReFX3
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
127.0.0.1:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f70ab39ef63b1e7bfeefbe2d40c02c6f_JaffaCakes118.exe