General
-
Target
3f4a1b440a09c566d051caf5f4a3ca42_JaffaCakes118
-
Size
389KB
-
Sample
241013-mcdrps1era
-
MD5
3f4a1b440a09c566d051caf5f4a3ca42
-
SHA1
c4732a88454edeef6e218aa799f9d015adb10de4
-
SHA256
ed5a9a1c778f6e8e1a9bed714a1d4f6182afed163795bbb79125ae8d77affdf7
-
SHA512
cba7fbf9e861f4ff581a9ede6a1f8f88cd8f5786b8031ed54c984f2316b026cd945861e61885dddee5b83ac7a73edc0fe3a2ac54281ebd4b0aae2cbec93d1b7c
-
SSDEEP
12288:BT5nOImh/vcqEt1u8hlQDdSDj1xAuSu0tt:1QIm9soSDj1xT30X
Static task
static1
Behavioral task
behavioral1
Sample
3f4a1b440a09c566d051caf5f4a3ca42_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3f4a1b440a09c566d051caf5f4a3ca42_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
3f4a1b440a09c566d051caf5f4a3ca42_JaffaCakes118
-
Size
389KB
-
MD5
3f4a1b440a09c566d051caf5f4a3ca42
-
SHA1
c4732a88454edeef6e218aa799f9d015adb10de4
-
SHA256
ed5a9a1c778f6e8e1a9bed714a1d4f6182afed163795bbb79125ae8d77affdf7
-
SHA512
cba7fbf9e861f4ff581a9ede6a1f8f88cd8f5786b8031ed54c984f2316b026cd945861e61885dddee5b83ac7a73edc0fe3a2ac54281ebd4b0aae2cbec93d1b7c
-
SSDEEP
12288:BT5nOImh/vcqEt1u8hlQDdSDj1xAuSu0tt:1QIm9soSDj1xT30X
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-