General
-
Target
a763573243b374b99bbeed9710709da3_JaffaCakes118
-
Size
253KB
-
Sample
241127-mhjvxawnfk
-
MD5
a763573243b374b99bbeed9710709da3
-
SHA1
b8c74fc1e56689c1d0ed303ca4deda31a50e5a97
-
SHA256
a63b74ead0e28dc9b9873cd15e65d656f0694ddfacd0f78965c291d0e87879f9
-
SHA512
2a877d2ad008534fa963130ad5c866d82852f1fa287f26e525dd9c9a3945a0f400a2aab5e82b38f2d5b329b06cefb304e3c3723fce1e887666170e42d3f2a9f8
-
SSDEEP
6144:wohZUPi4NiH5rGPm0gTOjpFfu/Db5l/kPjomLT:VhZ+uOXunijL
Static task
static1
Behavioral task
behavioral1
Sample
a763573243b374b99bbeed9710709da3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a763573243b374b99bbeed9710709da3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
a763573243b374b99bbeed9710709da3_JaffaCakes118
-
Size
253KB
-
MD5
a763573243b374b99bbeed9710709da3
-
SHA1
b8c74fc1e56689c1d0ed303ca4deda31a50e5a97
-
SHA256
a63b74ead0e28dc9b9873cd15e65d656f0694ddfacd0f78965c291d0e87879f9
-
SHA512
2a877d2ad008534fa963130ad5c866d82852f1fa287f26e525dd9c9a3945a0f400a2aab5e82b38f2d5b329b06cefb304e3c3723fce1e887666170e42d3f2a9f8
-
SSDEEP
6144:wohZUPi4NiH5rGPm0gTOjpFfu/Db5l/kPjomLT:VhZ+uOXunijL
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-