General
-
Target
bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118
-
Size
149KB
-
Sample
241204-al3e7s1re1
-
MD5
bfed004f981bc216bdd584e9202c8b6e
-
SHA1
d241adfba8f01e1326bfc1dda33da842bba4636c
-
SHA256
6da9079d6bcc6e40fceb8513b32235b2ff6b462a32739c02fbe7844665cff1f5
-
SHA512
f71fc3517e0af8619350a8479a77334a1d849e9ad4e3eb41765e15394d78280f54de9f6e6be629cf7a620fb03275837faf17925890a8a62f87db074e60efd05b
-
SSDEEP
3072:ZbDCt2UkNPQq4JkYzTjTkgxVaIEvw882gR3RrJ04EhoQBs:1/U+PskMCIEvbYB+4EeQBs
Static task
static1
Behavioral task
behavioral1
Sample
bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
bfed004f981bc216bdd584e9202c8b6e_JaffaCakes118
-
Size
149KB
-
MD5
bfed004f981bc216bdd584e9202c8b6e
-
SHA1
d241adfba8f01e1326bfc1dda33da842bba4636c
-
SHA256
6da9079d6bcc6e40fceb8513b32235b2ff6b462a32739c02fbe7844665cff1f5
-
SHA512
f71fc3517e0af8619350a8479a77334a1d849e9ad4e3eb41765e15394d78280f54de9f6e6be629cf7a620fb03275837faf17925890a8a62f87db074e60efd05b
-
SSDEEP
3072:ZbDCt2UkNPQq4JkYzTjTkgxVaIEvw882gR3RrJ04EhoQBs:1/U+PskMCIEvbYB+4EeQBs
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-