General
-
Target
b493cf0fe1f93895aca6b6834edb62b0_JaffaCakes118
-
Size
220KB
-
Sample
241130-d2ldeavjhn
-
MD5
b493cf0fe1f93895aca6b6834edb62b0
-
SHA1
2af8f287ce851f3d11b1f0a5ca33f6bba1d612ca
-
SHA256
e7e37b61aac7b9e44c65493187584f285ef5986e2c44f7747663971f60d34b5c
-
SHA512
d4159d22f90cfbe7601a51edfb3411d2589c21f5cb4955270b3eb84878fb9bbf975ac0dac917a34865da13422979f53a54008cf5a26735b3368408145cdc254a
-
SSDEEP
6144:t1JIfielipuGOMlliO1DmWIgff9aGzde4qz:t1JKi8ciYq0fZzqz
Static task
static1
Behavioral task
behavioral1
Sample
b493cf0fe1f93895aca6b6834edb62b0_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
b493cf0fe1f93895aca6b6834edb62b0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
b493cf0fe1f93895aca6b6834edb62b0_JaffaCakes118
-
Size
220KB
-
MD5
b493cf0fe1f93895aca6b6834edb62b0
-
SHA1
2af8f287ce851f3d11b1f0a5ca33f6bba1d612ca
-
SHA256
e7e37b61aac7b9e44c65493187584f285ef5986e2c44f7747663971f60d34b5c
-
SHA512
d4159d22f90cfbe7601a51edfb3411d2589c21f5cb4955270b3eb84878fb9bbf975ac0dac917a34865da13422979f53a54008cf5a26735b3368408145cdc254a
-
SSDEEP
6144:t1JIfielipuGOMlliO1DmWIgff9aGzde4qz:t1JKi8ciYq0fZzqz
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-