General
-
Target
cc9994c73fb6eec72b51256f7015110b_JaffaCakes118
-
Size
5.0MB
-
Sample
241206-mx6cfstna1
-
MD5
cc9994c73fb6eec72b51256f7015110b
-
SHA1
40a1cac85ec14eca254d3efed9d36f59cae704fa
-
SHA256
815a071218fc73dbfc2452deb03954ba2b195ea8d8bf8e8a31fd1a29be7314df
-
SHA512
52ae14e4899e79e66e071468d8a6634b8264b3222fceb034df400bd712024c8378c432db0608f54a4d984d18ebc8a67746e76192610b2af429413c54ee070bf0
-
SSDEEP
49152:Lh8EVJ/qGjE4C9zBEVzWZnJYGS74rdC72VYHF68nrORQFjI8um9CKrOiyb6IDT3M:Lh8EHqGjEIWZht
Static task
static1
Behavioral task
behavioral1
Sample
cc9994c73fb6eec72b51256f7015110b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cc9994c73fb6eec72b51256f7015110b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
windows/download_exec
http://104.225.151.94:443/jquery-3.3.1.slim.min.js
Targets
-
-
Target
cc9994c73fb6eec72b51256f7015110b_JaffaCakes118
-
Size
5.0MB
-
MD5
cc9994c73fb6eec72b51256f7015110b
-
SHA1
40a1cac85ec14eca254d3efed9d36f59cae704fa
-
SHA256
815a071218fc73dbfc2452deb03954ba2b195ea8d8bf8e8a31fd1a29be7314df
-
SHA512
52ae14e4899e79e66e071468d8a6634b8264b3222fceb034df400bd712024c8378c432db0608f54a4d984d18ebc8a67746e76192610b2af429413c54ee070bf0
-
SSDEEP
49152:Lh8EVJ/qGjE4C9zBEVzWZnJYGS74rdC72VYHF68nrORQFjI8um9CKrOiyb6IDT3M:Lh8EHqGjEIWZht
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Looks for VirtualBox Guest Additions in registry
-
Drops file in Drivers directory
-
Looks for VMWare Tools registry key
-
Sets service image path in registry
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Executes dropped EXE
-
Loads dropped DLL
-
System Binary Proxy Execution: Rundll32
Abuse Rundll32 to proxy execution of malicious code.
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
1System Binary Proxy Execution
1Rundll32
1Virtualization/Sandbox Evasion
2