General
-
Target
b1f2d0b40827c4923df9074d535a1401_JaffaCakes118
-
Size
832KB
-
Sample
241129-r64mfavrhp
-
MD5
b1f2d0b40827c4923df9074d535a1401
-
SHA1
4d483e84d6c62b7764ba4c7d657393d476ccf647
-
SHA256
e047ffd376de7091472a9259813e9e91790fd8dd4ff5ba90a7054242f6b075e6
-
SHA512
3576ee0dfecc01f1fe049e07e2f84566dfae2bbb84c06a210fea5916b02afe912c50dfdf43288de70c03bfef3a9a7c9227c239d1e875b01f479e70c80a25d433
-
SSDEEP
12288:7XrHTWz5AkGaOTTAPWwC3kAH4cdzG7Qd0ynYaJflJy2jhFR5Nl3s2r3eIYQ5yws:DjCV0TbL37YKSaJf221F/82r3eJQn
Static task
static1
Behavioral task
behavioral1
Sample
b1f2d0b40827c4923df9074d535a1401_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b1f2d0b40827c4923df9074d535a1401_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
b1f2d0b40827c4923df9074d535a1401_JaffaCakes118
-
Size
832KB
-
MD5
b1f2d0b40827c4923df9074d535a1401
-
SHA1
4d483e84d6c62b7764ba4c7d657393d476ccf647
-
SHA256
e047ffd376de7091472a9259813e9e91790fd8dd4ff5ba90a7054242f6b075e6
-
SHA512
3576ee0dfecc01f1fe049e07e2f84566dfae2bbb84c06a210fea5916b02afe912c50dfdf43288de70c03bfef3a9a7c9227c239d1e875b01f479e70c80a25d433
-
SSDEEP
12288:7XrHTWz5AkGaOTTAPWwC3kAH4cdzG7Qd0ynYaJflJy2jhFR5Nl3s2r3eIYQ5yws:DjCV0TbL37YKSaJf221F/82r3eJQn
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Drops file in Drivers directory
-
Deletes itself
-
Executes dropped EXE
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-