Analysis
-
max time kernel
149s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-12-2024 16:39
Static task
static1
Behavioral task
behavioral1
Sample
ce026f7974a21595f11282e7d22f1b15_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce026f7974a21595f11282e7d22f1b15_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ce026f7974a21595f11282e7d22f1b15_JaffaCakes118.exe
-
Size
13KB
-
MD5
ce026f7974a21595f11282e7d22f1b15
-
SHA1
b27c38767516c861a8b1f2072ccc237c773c74ce
-
SHA256
ad761d04e7907b2f8231b47eba2c2d4add72f0c2d8a360d1e17b96dd17cf2576
-
SHA512
b171f8926253f5bb81e5aedb2077244bb17e37911541187d89ff1d23045eda1ba23255f1af1589b3d90be650fd1c8afe23f807da4c79188413298a0a5fe3c14f
-
SSDEEP
192:HgENMgRFNGfX+vaP2ZRsOKFjpANsfS34XA+6RuYZdEMOdhng:HGOGfX+vRySaS6A+6wYZrOT
Malware Config
Extracted
metasploit
metasploit_stager
192.168.0.199:443
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family