Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 23:49
Behavioral task
behavioral1
Sample
a4c7e7d52b6fea63e28694bfc9bc713b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a4c7e7d52b6fea63e28694bfc9bc713b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a4c7e7d52b6fea63e28694bfc9bc713b_JaffaCakes118.exe
-
Size
37KB
-
MD5
a4c7e7d52b6fea63e28694bfc9bc713b
-
SHA1
b625e0562a67c1ca42fff468c00258b95b52f906
-
SHA256
6cfd3f1605342f97ec7f22db1141357e8aac01d9a9c34d816ea4b9b421c83fdf
-
SHA512
dbda167af200e6ca524c27203d3c4c4cdb5b825bc31489d11e19c13f2b5a513e25786c15ac42579a2dbd560aab12a1e14a8afd6bdc437eb171b5760801c157d2
-
SSDEEP
768:Tux6dqTxsxkHK946xndZcI29k9H1BZhOxyJEtiFv4M6lRZ95x:TuTsxKun12e9HZA8a5h5x
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family