General
-
Target
064684d7d9899aafc87f1205b6462d33_JaffaCakes118
-
Size
1.3MB
-
Sample
241001-sdaz4azbmf
-
MD5
064684d7d9899aafc87f1205b6462d33
-
SHA1
ac2e46e128089352244d7d8a8cdc7d94a2541a28
-
SHA256
063d9efd46ea1a0f8375635c9fdaa080145423f5bf92d03e94792d2be12e08a9
-
SHA512
1c37e7f0e5b9afe1ebdb1221f3e5383b227c3f23cd4146eb1e38af4300791218b2ad83065eca06d62e5eca747f21633c14fb54d003353b90049cc1e909c7b6bd
-
SSDEEP
24576:tnIv0BXPHrlyOcjJyiW0ary509/+j3lomwu9dLNcw8r1kXDZt+jpAl7zRg:q8B/hWraK0gj3Kmw8ApEDWj07m
Static task
static1
Behavioral task
behavioral1
Sample
064684d7d9899aafc87f1205b6462d33_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
064684d7d9899aafc87f1205b6462d33_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
064684d7d9899aafc87f1205b6462d33_JaffaCakes118
-
Size
1.3MB
-
MD5
064684d7d9899aafc87f1205b6462d33
-
SHA1
ac2e46e128089352244d7d8a8cdc7d94a2541a28
-
SHA256
063d9efd46ea1a0f8375635c9fdaa080145423f5bf92d03e94792d2be12e08a9
-
SHA512
1c37e7f0e5b9afe1ebdb1221f3e5383b227c3f23cd4146eb1e38af4300791218b2ad83065eca06d62e5eca747f21633c14fb54d003353b90049cc1e909c7b6bd
-
SSDEEP
24576:tnIv0BXPHrlyOcjJyiW0ary509/+j3lomwu9dLNcw8r1kXDZt+jpAl7zRg:q8B/hWraK0gj3Kmw8ApEDWj07m
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-