General
-
Target
987479d24b50689b283c4098c4db39d5_JaffaCakes118
-
Size
140KB
-
Sample
241125-b3nttaxkcj
-
MD5
987479d24b50689b283c4098c4db39d5
-
SHA1
d43d93d73cdc569787d7f306a170d181b88534a0
-
SHA256
56246e742010b711745e48e61c2a34ada7bcd19c80224ce03d0b398dbe08ca26
-
SHA512
c06eb09d62f2af207f3f6bd818b8bb47303c6cc54135fa263ba0ac2a401f74e420699a3376872f11e7926ca0c5769cb38ba3fee87a7020955ebde5eb3f4a8b92
-
SSDEEP
3072:R3OVNXgWYmutXzUO8oD6mvwc/+HC4UNJjEenSDAr48Lp:FOojXAnDXixjda8Lp
Static task
static1
Behavioral task
behavioral1
Sample
987479d24b50689b283c4098c4db39d5_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
987479d24b50689b283c4098c4db39d5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
987479d24b50689b283c4098c4db39d5_JaffaCakes118
-
Size
140KB
-
MD5
987479d24b50689b283c4098c4db39d5
-
SHA1
d43d93d73cdc569787d7f306a170d181b88534a0
-
SHA256
56246e742010b711745e48e61c2a34ada7bcd19c80224ce03d0b398dbe08ca26
-
SHA512
c06eb09d62f2af207f3f6bd818b8bb47303c6cc54135fa263ba0ac2a401f74e420699a3376872f11e7926ca0c5769cb38ba3fee87a7020955ebde5eb3f4a8b92
-
SSDEEP
3072:R3OVNXgWYmutXzUO8oD6mvwc/+HC4UNJjEenSDAr48Lp:FOojXAnDXixjda8Lp
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service
-
Modifies Windows Firewall
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
2Disable or Modify Tools
2Modify Registry
3