General
-
Target
ad57c11e2e247bd1da2d347d75c4437c_JaffaCakes118
-
Size
92KB
-
Sample
241128-x5765asrbn
-
MD5
ad57c11e2e247bd1da2d347d75c4437c
-
SHA1
d8bed8aa9fb06e1122a6d867de5bb663639af0c2
-
SHA256
e4252b8b4d079f826c804ca1367fd36c59347ca8be6f8acdb3e3d8f63edd7d75
-
SHA512
9a74e320f46717fb8a621beb86e47589871ad70210e6f8ecd6f0f40e7af056dc9ebe24e30df5338ff06309f93356b59f4e3c7efffafcd4766787dcbe2cddc274
-
SSDEEP
1536:VSquE20GQkzvdyF7+lpDbaQ6x+HPG5Hww108pIUvsgwzMG3RCk8NswK2k:ykMHa90HPG5Fjv4zfiC2k
Static task
static1
Behavioral task
behavioral1
Sample
ad57c11e2e247bd1da2d347d75c4437c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ad57c11e2e247bd1da2d347d75c4437c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
ad57c11e2e247bd1da2d347d75c4437c_JaffaCakes118
-
Size
92KB
-
MD5
ad57c11e2e247bd1da2d347d75c4437c
-
SHA1
d8bed8aa9fb06e1122a6d867de5bb663639af0c2
-
SHA256
e4252b8b4d079f826c804ca1367fd36c59347ca8be6f8acdb3e3d8f63edd7d75
-
SHA512
9a74e320f46717fb8a621beb86e47589871ad70210e6f8ecd6f0f40e7af056dc9ebe24e30df5338ff06309f93356b59f4e3c7efffafcd4766787dcbe2cddc274
-
SSDEEP
1536:VSquE20GQkzvdyF7+lpDbaQ6x+HPG5Hww108pIUvsgwzMG3RCk8NswK2k:ykMHa90HPG5Fjv4zfiC2k
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-