General
-
Target
ba989968b0b612fcd5be4f13420e90d7_JaffaCakes118
-
Size
174KB
-
Sample
241202-2zae5axlgs
-
MD5
ba989968b0b612fcd5be4f13420e90d7
-
SHA1
8eb5d17ac4a6930464426fc48a2c18c11150bbd5
-
SHA256
25852638935167770734c0ffd7577d03fda9f5f9d45155153f31abf2c5300ff0
-
SHA512
d884ff5ace0d8974f2240b3a0c7da1062d482932a96232e4301d4ab43ebd27b303981727ac0af567166f39b54b125bce237005892ad00b82eeceefd9e75a7a58
-
SSDEEP
3072:q6UHMux55clgTn/iHmKtzld4as4MhX7VCLpsM7dRrveuJwWRTw:BucgL/m4aHuXQh7LeuvRk
Static task
static1
Behavioral task
behavioral1
Sample
ba989968b0b612fcd5be4f13420e90d7_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ba989968b0b612fcd5be4f13420e90d7_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
ba989968b0b612fcd5be4f13420e90d7_JaffaCakes118
-
Size
174KB
-
MD5
ba989968b0b612fcd5be4f13420e90d7
-
SHA1
8eb5d17ac4a6930464426fc48a2c18c11150bbd5
-
SHA256
25852638935167770734c0ffd7577d03fda9f5f9d45155153f31abf2c5300ff0
-
SHA512
d884ff5ace0d8974f2240b3a0c7da1062d482932a96232e4301d4ab43ebd27b303981727ac0af567166f39b54b125bce237005892ad00b82eeceefd9e75a7a58
-
SSDEEP
3072:q6UHMux55clgTn/iHmKtzld4as4MhX7VCLpsM7dRrveuJwWRTw:BucgL/m4aHuXQh7LeuvRk
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-