Analysis

  • max time kernel
    147s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25-09-2024 05:06

General

  • Target

    f540391d9939d0493882cefdd612ce9c_JaffaCakes118.exe

  • Size

    945KB

  • MD5

    f540391d9939d0493882cefdd612ce9c

  • SHA1

    8f038cca1e1242b47ce2b7fb8b13ebff49e8d9e7

  • SHA256

    582a399a5e4e611ddaae03702d124f11ccdb1a425f4a8216f50c76f9b5bc32f3

  • SHA512

    93cc540d0c89a4aab490d889d31a53a32be465d660561859c127b839ba4ad993f3f1e4249fee9f12c72ae57568fa1fef2566367f014f64be8c47aed2946814c0

  • SSDEEP

    6144:3icpjCn4NoX7wO2oxPLHKOsz6mLwxSVPSr41KvbSVPSr41KvZBILUz:ycxCaA8jOsz6mLwIizvWizvgUz

Malware Config

Extracted

Family

metasploit

Version

windows/download_exec

C2

http://192.168.1.121:8443/EGke

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f540391d9939d0493882cefdd612ce9c_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f540391d9939d0493882cefdd612ce9c_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:2636

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2636-0-0x0000000000100000-0x0000000000101000-memory.dmp

    Filesize

    4KB