Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 07:48
Behavioral task
behavioral1
Sample
9a289831d5bd565672b646ae1b671e8f_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
9a289831d5bd565672b646ae1b671e8f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9a289831d5bd565672b646ae1b671e8f_JaffaCakes118.exe
-
Size
72KB
-
MD5
9a289831d5bd565672b646ae1b671e8f
-
SHA1
7bf4dc0208eaef14033cebeb9d86686ac105e986
-
SHA256
bcec1f78ecc1f8135249340fc74abb72d50609beb97cf68b6cfa5a88bb6a414a
-
SHA512
c85848fdea360cc1d64b8ecd024498ebc52f60fcc998eca360404723c115cab940f06649915574e5200c35cc911715f5c8fa528aab9a9e16631a834ef5c5c711
-
SSDEEP
1536:IwvDHMptfvyOtDYnddGbLwx/RFhMb+KR0Nc8QsJq39:lvzMX3ym4dk8xJFhe0Nc8QsC9
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
80.59.116.204:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9a289831d5bd565672b646ae1b671e8f_JaffaCakes118.exe