General
-
Target
b45a910ac7f965d9f95dce93ca78c61d_JaffaCakes118
-
Size
53KB
-
Sample
241130-carwfa1lcm
-
MD5
b45a910ac7f965d9f95dce93ca78c61d
-
SHA1
0bc171f0013550d9a4b0bc2583b43f38e27f424b
-
SHA256
156325cabc8969ca4e517949ad5aac39520879ffb136d793ce9f8972813d7a8c
-
SHA512
6fd9c26042bf0845e911e266257448fa710403319c1c3fea677331b62ca971219f379b4ed653474da8c3aca00c6d1c88a8b3e30e4f543739b12b0525a2625029
-
SSDEEP
768:N7Bmi7TZITxaPE4YwEIpHrQ4NJ+tkXbMVeT5hBoDb9qCKpvzwYsw2M:Noi7TKdaPpEIuCXbM0hB+8UYsw2M
Behavioral task
behavioral1
Sample
b45a910ac7f965d9f95dce93ca78c61d_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b45a910ac7f965d9f95dce93ca78c61d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
b45a910ac7f965d9f95dce93ca78c61d_JaffaCakes118
-
Size
53KB
-
MD5
b45a910ac7f965d9f95dce93ca78c61d
-
SHA1
0bc171f0013550d9a4b0bc2583b43f38e27f424b
-
SHA256
156325cabc8969ca4e517949ad5aac39520879ffb136d793ce9f8972813d7a8c
-
SHA512
6fd9c26042bf0845e911e266257448fa710403319c1c3fea677331b62ca971219f379b4ed653474da8c3aca00c6d1c88a8b3e30e4f543739b12b0525a2625029
-
SSDEEP
768:N7Bmi7TZITxaPE4YwEIpHrQ4NJ+tkXbMVeT5hBoDb9qCKpvzwYsw2M:Noi7TKdaPpEIuCXbM0hB+8UYsw2M
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service
-
Executes dropped EXE
-
Adds Run key to start application
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1