Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-11-2024 04:16
Static task
static1
Behavioral task
behavioral1
Sample
aed68fddf11940598c13dffc6c8277b3_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aed68fddf11940598c13dffc6c8277b3_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
aed68fddf11940598c13dffc6c8277b3_JaffaCakes118.exe
-
Size
81KB
-
MD5
aed68fddf11940598c13dffc6c8277b3
-
SHA1
445a37a85ebd454020accb78d6cae405a002efe2
-
SHA256
8c6e0472840ab4115951e11c51394d3117ab930869bd808938d95950daa837b1
-
SHA512
922588706f84bcf0116550fa81cc2824de4f98234f87e597614b07c15a494d24ff622fd1020fd4f8cfd0d244a9a19d8b5b26d3c93594d9332d53d01ebf9128f3
-
SSDEEP
1536:9cACZ4xhTfi4J83RsDnhqCPFZE03OpfaTFImqJYKP/QXkAn:99li4JfDwyZ532faCmJKPYUO
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aed68fddf11940598c13dffc6c8277b3_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2872 aed68fddf11940598c13dffc6c8277b3_JaffaCakes118.exe