General
-
Target
d446284002f47cbf7f565e80a16c3854_JaffaCakes118
-
Size
137KB
-
Sample
241208-absg9awqdj
-
MD5
d446284002f47cbf7f565e80a16c3854
-
SHA1
9bd0cd9833efdc7154c3d7dd99914dbb17e6fbd3
-
SHA256
11c0fd540f52098dd29fd81ade38bdee44e3f45a44485a43699d1275d253e7b6
-
SHA512
9002454217757f2d225f81d0f967141771663ee01fc8a13ee429a8a5da67760990f6e1997eebe8169a8ff2c0c8619b6b025cd388d92d6216947a2a391556b8b8
-
SSDEEP
3072:sjcrKunQngXHNz1i2XlCmYBsqy0f7VMzRmle4YPvjil47tJYY3:sjdu4eHL91CmYWqrxMglaWl4Z
Static task
static1
Behavioral task
behavioral1
Sample
d446284002f47cbf7f565e80a16c3854_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d446284002f47cbf7f565e80a16c3854_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
d446284002f47cbf7f565e80a16c3854_JaffaCakes118
-
Size
137KB
-
MD5
d446284002f47cbf7f565e80a16c3854
-
SHA1
9bd0cd9833efdc7154c3d7dd99914dbb17e6fbd3
-
SHA256
11c0fd540f52098dd29fd81ade38bdee44e3f45a44485a43699d1275d253e7b6
-
SHA512
9002454217757f2d225f81d0f967141771663ee01fc8a13ee429a8a5da67760990f6e1997eebe8169a8ff2c0c8619b6b025cd388d92d6216947a2a391556b8b8
-
SSDEEP
3072:sjcrKunQngXHNz1i2XlCmYBsqy0f7VMzRmle4YPvjil47tJYY3:sjdu4eHL91CmYWqrxMglaWl4Z
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service
-
Modifies Windows Firewall
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
2Disable or Modify Tools
2Modify Registry
3