Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 01:12
Behavioral task
behavioral1
Sample
ffa7647352a2b54ee85ba81429d2da7f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffa7647352a2b54ee85ba81429d2da7f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ffa7647352a2b54ee85ba81429d2da7f_JaffaCakes118.exe
-
Size
72KB
-
MD5
ffa7647352a2b54ee85ba81429d2da7f
-
SHA1
7a59007180689287937ed624b2a6451c4a2d00ec
-
SHA256
8295791613aa90d5bf6058b09e78c51368cf5c64913740eaf5f0a0ad22b84369
-
SHA512
7afde91a6329f7b70e834b4437de00a3d5c70aee8b8edf02d9cf8ec913e88a6042447e452d3eb104ed05250fe28f6a4e51689e5dc963b962aecc291d6a41578e
-
SSDEEP
1536:I1dRcnuol/Vm3iI4adK4Quokz8Mb+KR0Nc8QsJq39:kDXolwx904Nok8e0Nc8QsC9
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
62.98.9.26:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ffa7647352a2b54ee85ba81429d2da7f_JaffaCakes118.exe