General
-
Target
0f8b8921b6af78dd824bb69e5deba52a_JaffaCakes118
-
Size
168KB
-
Sample
241003-tm21lsxfrc
-
MD5
0f8b8921b6af78dd824bb69e5deba52a
-
SHA1
17fdfe54259e3fe18519687b422fc80b56eea9cc
-
SHA256
ddf95ebe93a824366bcb1189cee4b2f3f2f4bab096a0c8eb622d68c1ceb36c42
-
SHA512
2679765aab460794701ada93f6aa55bbfd6bd73ae7fd9eb165141edd5abc166ac950ac9dc68bf9b39e1013c81226f7a7397e2f75cbd200c0c36488aa7eff91c2
-
SSDEEP
3072:YCTVABs1lqfVq5RjMwG90zPbS3wyWFuo9gLW6D9C5n1hd/id5TRoJBVBCo:n91lqfGjU90XNyWFZOLW6BC5Td63Tw7
Static task
static1
Behavioral task
behavioral1
Sample
0f8b8921b6af78dd824bb69e5deba52a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f8b8921b6af78dd824bb69e5deba52a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
0f8b8921b6af78dd824bb69e5deba52a_JaffaCakes118
-
Size
168KB
-
MD5
0f8b8921b6af78dd824bb69e5deba52a
-
SHA1
17fdfe54259e3fe18519687b422fc80b56eea9cc
-
SHA256
ddf95ebe93a824366bcb1189cee4b2f3f2f4bab096a0c8eb622d68c1ceb36c42
-
SHA512
2679765aab460794701ada93f6aa55bbfd6bd73ae7fd9eb165141edd5abc166ac950ac9dc68bf9b39e1013c81226f7a7397e2f75cbd200c0c36488aa7eff91c2
-
SSDEEP
3072:YCTVABs1lqfVq5RjMwG90zPbS3wyWFuo9gLW6D9C5n1hd/id5TRoJBVBCo:n91lqfGjU90XNyWFZOLW6BC5Td63Tw7
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-