Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-12-2024 04:30
Static task
static1
Behavioral task
behavioral1
Sample
bbb7109d527c4a92cff8dca9414aa745_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bbb7109d527c4a92cff8dca9414aa745_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
bbb7109d527c4a92cff8dca9414aa745_JaffaCakes118.exe
-
Size
72KB
-
MD5
bbb7109d527c4a92cff8dca9414aa745
-
SHA1
333fc3b4a04fee1d753e3bae42690a133161695c
-
SHA256
bb3f0a5290513a7fb6a4b28cb58b5e11325b5975ffadaf95c8ec25a2dbc3b3ba
-
SHA512
45d2751fe3f73d26e1a0c1cf3249a96dcae9c15fc4128661652b2618e3af467727fbdf898a3653d576864cb31218304e2ea4976ddf6c08faf9177f9296bcee50
-
SSDEEP
1536:IhgCZSmpHZFI6BagoALcAYbMb+KR0Nc8QsJq39:FCZSOFjnnLcAYbe0Nc8QsC9
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bbb7109d527c4a92cff8dca9414aa745_JaffaCakes118.exe