General
-
Target
8de59673ac9353799a12a56a67320838_JaffaCakes118
-
Size
50KB
-
Sample
241103-2vzt8axdlk
-
MD5
8de59673ac9353799a12a56a67320838
-
SHA1
edabb9f45f135ebc6e18c3a741381026311232f9
-
SHA256
df1b65f650a9ae56b83a9a6b14369872cb91c605da187eb568a81fe34b7ec617
-
SHA512
2ca6ec396b099dd36e59ea68fcaa8108902bd5076a1f1a25e23dcb546606f3181c06d33d1c341b842e480952943d8c1b3868f0a5f7b2164e93885d3f9c24a334
-
SSDEEP
768:gSnpKQ7H3YJmAe+cItZApv6C4OVpAB34Caxxy3hrXkUe/8cKTCImuJ6:dpKQYHcwaSC4aKJxaO1ATuXmuk
Static task
static1
Behavioral task
behavioral1
Sample
8de59673ac9353799a12a56a67320838_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8de59673ac9353799a12a56a67320838_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
8de59673ac9353799a12a56a67320838_JaffaCakes118
-
Size
50KB
-
MD5
8de59673ac9353799a12a56a67320838
-
SHA1
edabb9f45f135ebc6e18c3a741381026311232f9
-
SHA256
df1b65f650a9ae56b83a9a6b14369872cb91c605da187eb568a81fe34b7ec617
-
SHA512
2ca6ec396b099dd36e59ea68fcaa8108902bd5076a1f1a25e23dcb546606f3181c06d33d1c341b842e480952943d8c1b3868f0a5f7b2164e93885d3f9c24a334
-
SSDEEP
768:gSnpKQ7H3YJmAe+cItZApv6C4OVpAB34Caxxy3hrXkUe/8cKTCImuJ6:dpKQYHcwaSC4aKJxaO1ATuXmuk
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-