General
-
Target
fcb78beb3ade01d700e5b4cf43fcbf72_JaffaCakes118
-
Size
80KB
-
Sample
240928-t79k7aycle
-
MD5
fcb78beb3ade01d700e5b4cf43fcbf72
-
SHA1
04745a18a0aed7b8aa83e643a3ff436680fe1e5f
-
SHA256
8375133d600c5a5e115cb2c9016f28ed52f06dbdf3576533239325803f149825
-
SHA512
df826418f4018b0ed6686d3357e61d6e03e3bd9c442e6645922c8a8f5274158c8fffa4dc84425a1aad3319872d57536090168cdf291d80f09fbaee50ca49bd26
-
SSDEEP
1536:U66svlWxtoBNy6PWEmPzXs/SSAOAB65N/zg:5LNctI4OW3PzGkJg/zg
Static task
static1
Behavioral task
behavioral1
Sample
fcb78beb3ade01d700e5b4cf43fcbf72_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fcb78beb3ade01d700e5b4cf43fcbf72_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
fcb78beb3ade01d700e5b4cf43fcbf72_JaffaCakes118
-
Size
80KB
-
MD5
fcb78beb3ade01d700e5b4cf43fcbf72
-
SHA1
04745a18a0aed7b8aa83e643a3ff436680fe1e5f
-
SHA256
8375133d600c5a5e115cb2c9016f28ed52f06dbdf3576533239325803f149825
-
SHA512
df826418f4018b0ed6686d3357e61d6e03e3bd9c442e6645922c8a8f5274158c8fffa4dc84425a1aad3319872d57536090168cdf291d80f09fbaee50ca49bd26
-
SSDEEP
1536:U66svlWxtoBNy6PWEmPzXs/SSAOAB65N/zg:5LNctI4OW3PzGkJg/zg
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-