General
-
Target
b3e15052cc10186807e8a967341ac8f5_JaffaCakes118
-
Size
88KB
-
Sample
241129-2m8gdsvlap
-
MD5
b3e15052cc10186807e8a967341ac8f5
-
SHA1
4d1220a77e74e5eaa6915c8d349fbdf6c2a3bf44
-
SHA256
b4eb57b334171547f4086a92c0f2283921db6814e47390992d028cdf4fd1001c
-
SHA512
53d7650eeccfb205b6ad60600f36334f5a16bab6581a11bcb81ea202a4dc92cbde05a7b70424f10401ea0cc0636d0e4a57ff626d9431754f737c61d180111a0a
-
SSDEEP
1536:K+iFaEtB4Y//aXoo7YMMHYKXrX7QTW3j/VFVi/MV2OJMfdT:K+iFaEtiY/iXooMMMRXb7CW3j/j4eAT
Static task
static1
Behavioral task
behavioral1
Sample
b3e15052cc10186807e8a967341ac8f5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b3e15052cc10186807e8a967341ac8f5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
b3e15052cc10186807e8a967341ac8f5_JaffaCakes118
-
Size
88KB
-
MD5
b3e15052cc10186807e8a967341ac8f5
-
SHA1
4d1220a77e74e5eaa6915c8d349fbdf6c2a3bf44
-
SHA256
b4eb57b334171547f4086a92c0f2283921db6814e47390992d028cdf4fd1001c
-
SHA512
53d7650eeccfb205b6ad60600f36334f5a16bab6581a11bcb81ea202a4dc92cbde05a7b70424f10401ea0cc0636d0e4a57ff626d9431754f737c61d180111a0a
-
SSDEEP
1536:K+iFaEtB4Y//aXoo7YMMHYKXrX7QTW3j/VFVi/MV2OJMfdT:K+iFaEtiY/iXooMMMRXb7CW3j/j4eAT
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-