Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 15:59
Behavioral task
behavioral1
Sample
42fc29674abff7a0076291078e96ef83_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
42fc29674abff7a0076291078e96ef83_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
42fc29674abff7a0076291078e96ef83_JaffaCakes118.exe
-
Size
72KB
-
MD5
42fc29674abff7a0076291078e96ef83
-
SHA1
c37d62605939da06c95ea4d4b7254548262a05b5
-
SHA256
89ad315a5e7e21b9dfab420e4c08587bb348891f436ffe0e4b52ddb8acec7929
-
SHA512
66d727479f049ad69b7a9a32e04dcb207efce22c7b49243e3d987ec380f641e1ae29eee23e06113a30b69be1d0169c9f66ff1fd23b82dcd42aee042da52b514b
-
SSDEEP
1536:IFmcDBL4DvrR99fu+iZqEwrej2uTMb+KR0Nc8QsJq39:0dK/f9fDeGMe0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp_allports
192.168.1.91:1
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 42fc29674abff7a0076291078e96ef83_JaffaCakes118.exe