General
-
Target
ccd7eee3212f975ea5f2559290095acb_JaffaCakes118
-
Size
220KB
-
Sample
241206-nzyaaswlaz
-
MD5
ccd7eee3212f975ea5f2559290095acb
-
SHA1
55bd7608da8eb9515890c4c1ee119c5c15f135a1
-
SHA256
cee7c4925f79faa186c6024655ce85df643be3cd453b83b1b641adb4dba63333
-
SHA512
decad3a83ccc2f944b2dd7223b8cc319c858718f9b860edba0a836a6b4043d53a9ade197336c88373da2925b8ea8a18ed1c2a29b725f683c6f7e656b4dbdd394
-
SSDEEP
6144:jgiERHc6NTul3/1fUv/oukK0u1JW4bwAQAgTPke:jgiERdNTg/1fUH5kKkowToe
Static task
static1
Behavioral task
behavioral1
Sample
ccd7eee3212f975ea5f2559290095acb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ccd7eee3212f975ea5f2559290095acb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
ccd7eee3212f975ea5f2559290095acb_JaffaCakes118
-
Size
220KB
-
MD5
ccd7eee3212f975ea5f2559290095acb
-
SHA1
55bd7608da8eb9515890c4c1ee119c5c15f135a1
-
SHA256
cee7c4925f79faa186c6024655ce85df643be3cd453b83b1b641adb4dba63333
-
SHA512
decad3a83ccc2f944b2dd7223b8cc319c858718f9b860edba0a836a6b4043d53a9ade197336c88373da2925b8ea8a18ed1c2a29b725f683c6f7e656b4dbdd394
-
SSDEEP
6144:jgiERHc6NTul3/1fUv/oukK0u1JW4bwAQAgTPke:jgiERdNTg/1fUH5kKkowToe
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Looks for VMWare Tools registry key
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-