General
-
Target
9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118
-
Size
246KB
-
Sample
241126-cqw54avrgr
-
MD5
9f442fbd0d524ace9f540c38751d7c2e
-
SHA1
fc0a7dc9421d8817c47d0c279d2b11801f95733a
-
SHA256
15340ef62f68faa89580da965333eade30a56dd50ec961089801e3e56ab7c333
-
SHA512
0ca1c52eb1fb0532456354c7fd2a8b6e2cb90276c5e61d211be1d37cb21a1ee1613f6e0bfeac8562b9ef2d1ed27cf01b2c761d3d779e259a562a13b2c23ad9b5
-
SSDEEP
6144:LqRWEzuXcpYMtVLq47Sduit/QX9gvw0IgXn:+R3zuX0VORtYNgIOXn
Static task
static1
Behavioral task
behavioral1
Sample
9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
9f442fbd0d524ace9f540c38751d7c2e_JaffaCakes118
-
Size
246KB
-
MD5
9f442fbd0d524ace9f540c38751d7c2e
-
SHA1
fc0a7dc9421d8817c47d0c279d2b11801f95733a
-
SHA256
15340ef62f68faa89580da965333eade30a56dd50ec961089801e3e56ab7c333
-
SHA512
0ca1c52eb1fb0532456354c7fd2a8b6e2cb90276c5e61d211be1d37cb21a1ee1613f6e0bfeac8562b9ef2d1ed27cf01b2c761d3d779e259a562a13b2c23ad9b5
-
SSDEEP
6144:LqRWEzuXcpYMtVLq47Sduit/QX9gvw0IgXn:+R3zuX0VORtYNgIOXn
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-