Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2024 10:22

General

  • Target

    b09c41e44dbc22910fc0c3c1bd167c71_JaffaCakes118.exe

  • Size

    448KB

  • MD5

    b09c41e44dbc22910fc0c3c1bd167c71

  • SHA1

    f7500685bc6516b411c591d4a724e749cf4f40d1

  • SHA256

    32d56d24579d6f391cca8f4e73b40d3f337305128bc157f79fecd441971ac7e9

  • SHA512

    03572a002463dbf0ba5c84c34494e9d289e81b2585f7605b48033742536db10ebbd3cdf72523d2876e8ec2f8ff6cf7f42bd9dc2e5a5fd5427bbcfa7b138813d4

  • SSDEEP

    12288:wLXmgMb4Xd+Uh8ggdE8Ox4GoyPV4qOr1nBMIQn6:wDmgMbVujg9u4GBPVLOr1nvM6

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.1.40:4444

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\b09c41e44dbc22910fc0c3c1bd167c71_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b09c41e44dbc22910fc0c3c1bd167c71_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:3120

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3120-0-0x00000000005E0000-0x00000000005E1000-memory.dmp

    Filesize

    4KB

  • memory/3120-1-0x00000000005E0000-0x00000000005E1000-memory.dmp

    Filesize

    4KB