General
-
Target
f83e94b0a6ea198f5ebb3ad128ba391f_JaffaCakes118
-
Size
108KB
-
Sample
240926-na2anaxcqb
-
MD5
f83e94b0a6ea198f5ebb3ad128ba391f
-
SHA1
98949f6c25f3388c60ed61f6952af57d5d3c1c11
-
SHA256
4d90d35324aae678ef4c92f6644ec2d3e8d1f1d6bd8d1388af6436bca25d865d
-
SHA512
27d0f43e4c0ec73229c9799fb1d9f72e5953d10c673138fddcb41e7875bbf151e2469362e26b953aac1e439fad08af08b9d241da369f17c0d8d4f4c2d3974e95
-
SSDEEP
1536:Z+GJEbENMutFGHPieLyk0ndiPtNLloPOm7DDD0/AkXgKjsmf:ZX2IGutTuyk0ndwmpQIkQKjsm
Static task
static1
Behavioral task
behavioral1
Sample
f83e94b0a6ea198f5ebb3ad128ba391f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f83e94b0a6ea198f5ebb3ad128ba391f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
f83e94b0a6ea198f5ebb3ad128ba391f_JaffaCakes118
-
Size
108KB
-
MD5
f83e94b0a6ea198f5ebb3ad128ba391f
-
SHA1
98949f6c25f3388c60ed61f6952af57d5d3c1c11
-
SHA256
4d90d35324aae678ef4c92f6644ec2d3e8d1f1d6bd8d1388af6436bca25d865d
-
SHA512
27d0f43e4c0ec73229c9799fb1d9f72e5953d10c673138fddcb41e7875bbf151e2469362e26b953aac1e439fad08af08b9d241da369f17c0d8d4f4c2d3974e95
-
SSDEEP
1536:Z+GJEbENMutFGHPieLyk0ndiPtNLloPOm7DDD0/AkXgKjsmf:ZX2IGutTuyk0ndwmpQIkQKjsm
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-