General
-
Target
8dbf1f129c04ce0b601405cd62ae1a31_JaffaCakes118
-
Size
171KB
-
Sample
241103-169ccswcng
-
MD5
8dbf1f129c04ce0b601405cd62ae1a31
-
SHA1
98dd02f973985cf0b095e1bb239895b92809c822
-
SHA256
1dd7c70148d74fdecbeb2db274c1e25163c3c62b3bfbfafada89cf83070ffe8d
-
SHA512
6a1ec43b6cc8495a519fa39abb1379ebfe1ae1b3d751e475b11c0a87cbdf476f255e1d525a94d575ea7eb2f47d6d8b07d526f2f2e8a19ee58296872873595a83
-
SSDEEP
3072:ukfkXP5KTx+KJDvTcNE/NgyJnDIBetryV1DC5jiq:ukMkAKdvTDgyD0OL5ji
Static task
static1
Behavioral task
behavioral1
Sample
8dbf1f129c04ce0b601405cd62ae1a31_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8dbf1f129c04ce0b601405cd62ae1a31_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
8dbf1f129c04ce0b601405cd62ae1a31_JaffaCakes118
-
Size
171KB
-
MD5
8dbf1f129c04ce0b601405cd62ae1a31
-
SHA1
98dd02f973985cf0b095e1bb239895b92809c822
-
SHA256
1dd7c70148d74fdecbeb2db274c1e25163c3c62b3bfbfafada89cf83070ffe8d
-
SHA512
6a1ec43b6cc8495a519fa39abb1379ebfe1ae1b3d751e475b11c0a87cbdf476f255e1d525a94d575ea7eb2f47d6d8b07d526f2f2e8a19ee58296872873595a83
-
SSDEEP
3072:ukfkXP5KTx+KJDvTcNE/NgyJnDIBetryV1DC5jiq:ukMkAKdvTDgyD0OL5ji
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service
-
Modifies Windows Firewall
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
2Disable or Modify Tools
2Modify Registry
3