Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 17:22
Static task
static1
Behavioral task
behavioral1
Sample
96247e0abc27b8dfcd68bd93b8ec8838_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
96247e0abc27b8dfcd68bd93b8ec8838_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
96247e0abc27b8dfcd68bd93b8ec8838_JaffaCakes118.exe
-
Size
78KB
-
MD5
96247e0abc27b8dfcd68bd93b8ec8838
-
SHA1
87d39f379279a007ee1d80797bef8818422ab2bd
-
SHA256
fac63840d14aa1b12615dff9ff6b125984f300cc1fdeede80b17b4be7c4f0de1
-
SHA512
e9e4c529d8a8aa8492b02c7bef1664fcf491fe259a4bf984ed3754cabff724f896172901171d8e0496c8694653e792c043b3abdb07471539f4abf8c02bffcf3d
-
SSDEEP
1536:s8NmWji1eQFC0bVs+nIypfaTFIqWgaKREgmZlTzYnnnvfaa:s8Nri1eabVDIKfaCqnaJfTEnvj
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 96247e0abc27b8dfcd68bd93b8ec8838_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2600 96247e0abc27b8dfcd68bd93b8ec8838_JaffaCakes118.exe