Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-09-2024 06:50
Behavioral task
behavioral1
Sample
f7cd6953c041e34f5c06d45d5fd1b653_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7cd6953c041e34f5c06d45d5fd1b653_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f7cd6953c041e34f5c06d45d5fd1b653_JaffaCakes118.exe
-
Size
444KB
-
MD5
f7cd6953c041e34f5c06d45d5fd1b653
-
SHA1
4a244d72383b796710014ac26e3a3db77107b10e
-
SHA256
2c5f02b4ffa36681a0f50ae5076c3db45ee57de95c96c2a345f539ee404aacac
-
SHA512
9bbd9ed186654fe36451fca8606e2c671a94d4128dd3876a62fe39403fccf1d40e02581348609e781aec91a854d22e1542bbe81f3bc5e69f7b46d13d2898f150
-
SSDEEP
6144:fCdRtQcG5YD7APNKNRb4o41KEpc8EmLKRo1UEJHJVevweHWcxFg0SPPCRA7fFnbZ:adRtQx5bP87Mc8TLuedoIMIyQn6
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7cd6953c041e34f5c06d45d5fd1b653_JaffaCakes118.exe