General
-
Target
994f71a2e836a5573c51892cd861d77f_JaffaCakes118
-
Size
44KB
-
Sample
241125-fe484szjax
-
MD5
994f71a2e836a5573c51892cd861d77f
-
SHA1
8eeee768621e18e73727bc660ef0c59813cec5b6
-
SHA256
ef6da08c352bb37d39309452aea7102977e694c4f0d16e039e7e75603320e093
-
SHA512
04d67e3c75eb5406ae3a29d00da6b0f79aea4f76165bebe896065be4c92ede679ea7a15188addb5b6308403457d188f20c21a3824d4ab316d8a6c47f3fdb54d5
-
SSDEEP
768:8OBV+Yd09bhmYP9ZYgHgMpOzT4E9hbe/VYhZvtZwVMt09sCjpZJ6ODy72qR:YYd0bHLIh7y/eJZwVk0XjPJpD9qR
Static task
static1
Behavioral task
behavioral1
Sample
994f71a2e836a5573c51892cd861d77f_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
994f71a2e836a5573c51892cd861d77f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
994f71a2e836a5573c51892cd861d77f_JaffaCakes118
-
Size
44KB
-
MD5
994f71a2e836a5573c51892cd861d77f
-
SHA1
8eeee768621e18e73727bc660ef0c59813cec5b6
-
SHA256
ef6da08c352bb37d39309452aea7102977e694c4f0d16e039e7e75603320e093
-
SHA512
04d67e3c75eb5406ae3a29d00da6b0f79aea4f76165bebe896065be4c92ede679ea7a15188addb5b6308403457d188f20c21a3824d4ab316d8a6c47f3fdb54d5
-
SSDEEP
768:8OBV+Yd09bhmYP9ZYgHgMpOzT4E9hbe/VYhZvtZwVMt09sCjpZJ6ODy72qR:YYd0bHLIh7y/eJZwVk0XjPJpD9qR
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-