General
-
Target
a62a9926798173f4c3e39ddd6f50de32_JaffaCakes118
-
Size
169KB
-
Sample
241127-f7nf3azles
-
MD5
a62a9926798173f4c3e39ddd6f50de32
-
SHA1
9f8185187a37944a644bf680477bef36a4a97c55
-
SHA256
150fd9481857647a761596949c2de1baa86433b98d7eb394868ab9c2d9f1dd37
-
SHA512
5e1856341fac59b622bba7c33b6a6fc52e2307894132653d3a57d92ab89682bf593e956f4a1e374709a1da996960c64a9666596bb35e86cd2270038938b5fda9
-
SSDEEP
3072:92uRK0VYRg+yPbQNps8UBZgCwiMRPSmBnWppAuEklwERp:BbYP5UBZgCAPSW0KuEk3p
Static task
static1
Behavioral task
behavioral1
Sample
a62a9926798173f4c3e39ddd6f50de32_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a62a9926798173f4c3e39ddd6f50de32_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
a62a9926798173f4c3e39ddd6f50de32_JaffaCakes118
-
Size
169KB
-
MD5
a62a9926798173f4c3e39ddd6f50de32
-
SHA1
9f8185187a37944a644bf680477bef36a4a97c55
-
SHA256
150fd9481857647a761596949c2de1baa86433b98d7eb394868ab9c2d9f1dd37
-
SHA512
5e1856341fac59b622bba7c33b6a6fc52e2307894132653d3a57d92ab89682bf593e956f4a1e374709a1da996960c64a9666596bb35e86cd2270038938b5fda9
-
SSDEEP
3072:92uRK0VYRg+yPbQNps8UBZgCwiMRPSmBnWppAuEklwERp:BbYP5UBZgCAPSW0KuEk3p
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-