Analysis

  • max time kernel
    125s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2024 11:39

General

  • Target

    9b3d1a301042046b9210c8e9def705e8_JaffaCakes118.exe

  • Size

    72KB

  • MD5

    9b3d1a301042046b9210c8e9def705e8

  • SHA1

    3281d04cf37d8c1803faac90560fbaa8d1946178

  • SHA256

    b1ed6cc0437c57ee81b4e51d10e3394396421b3ff177ec0a06db4ac97211f8c3

  • SHA512

    922e2af15add4d41d5cc20e90e8ad1c352636ae03ec06876a2694ce89c5eeebba1c401df99b673282ab7f4953b6de32363c07dcf124901f272820ce30830f070

  • SSDEEP

    1536:IM+quW/flNpop7n5Fu4ZIrLMXMb+KR0Nc8QsJq39://fTyNny4ZIrAe0Nc8QsC9

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\9b3d1a301042046b9210c8e9def705e8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\9b3d1a301042046b9210c8e9def705e8_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1820

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1820-0-0x0000000000570000-0x0000000000574000-memory.dmp

    Filesize

    16KB