General
-
Target
d377db92f1aa8b5e13bcb4a5222a8803_JaffaCakes118
-
Size
275KB
-
Sample
241207-y7yk5sxlem
-
MD5
d377db92f1aa8b5e13bcb4a5222a8803
-
SHA1
e0de365a67eeddf7d960e88185937113c42cce60
-
SHA256
2b21784df901c9859aaa5a57ea2217b43a574c3e4df69ffaaa6cdb4865669586
-
SHA512
a5531f8d193dbd6c820eb7ac29ddfb0de38c4261323fb1c02aef74ea3baf298c5a97da295ae8e19021a4032c5099baed09b26afae46cb5f538380b8c9ac07de3
-
SSDEEP
6144:aAN41LQgjz7L8/62P1sXZ+zUfwRxCkhgMLlD2PS1It:aK41Muz/gmpGdRAkhgMLtg
Behavioral task
behavioral1
Sample
d377db92f1aa8b5e13bcb4a5222a8803_JaffaCakes118.exe
Resource
win7-20240903-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
d377db92f1aa8b5e13bcb4a5222a8803_JaffaCakes118
-
Size
275KB
-
MD5
d377db92f1aa8b5e13bcb4a5222a8803
-
SHA1
e0de365a67eeddf7d960e88185937113c42cce60
-
SHA256
2b21784df901c9859aaa5a57ea2217b43a574c3e4df69ffaaa6cdb4865669586
-
SHA512
a5531f8d193dbd6c820eb7ac29ddfb0de38c4261323fb1c02aef74ea3baf298c5a97da295ae8e19021a4032c5099baed09b26afae46cb5f538380b8c9ac07de3
-
SSDEEP
6144:aAN41LQgjz7L8/62P1sXZ+zUfwRxCkhgMLlD2PS1It:aK41Muz/gmpGdRAkhgMLtg
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-