General
-
Target
d7d11b49bf59d1b0729f371ea099dc9f_JaffaCakes118
-
Size
312KB
-
Sample
241208-s7ha9ssqar
-
MD5
d7d11b49bf59d1b0729f371ea099dc9f
-
SHA1
0c79c2e672e942f09008cd9e8cc008fa105f7525
-
SHA256
9b52078c49b89a3005893b903f86e6cbe56858ac48d6ff4da88df4ca564eb369
-
SHA512
48a2db43ae5a2ee78d8eb305dcbfc179047a2023bf8318974f1ea072461ff657041d734a505a45ec822ec7eb5c25f2b0f1ba7e4c06403cffbc93b0f8cfbe91ae
-
SSDEEP
6144:j0Dd6+SD+dYnY9cCxaTVfbtTkyrfX4y2NRxzCOfKKm8V:AM+SD+2n7CxaRbjrfX4yURJm
Static task
static1
Behavioral task
behavioral1
Sample
d7d11b49bf59d1b0729f371ea099dc9f_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d7d11b49bf59d1b0729f371ea099dc9f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
d7d11b49bf59d1b0729f371ea099dc9f_JaffaCakes118
-
Size
312KB
-
MD5
d7d11b49bf59d1b0729f371ea099dc9f
-
SHA1
0c79c2e672e942f09008cd9e8cc008fa105f7525
-
SHA256
9b52078c49b89a3005893b903f86e6cbe56858ac48d6ff4da88df4ca564eb369
-
SHA512
48a2db43ae5a2ee78d8eb305dcbfc179047a2023bf8318974f1ea072461ff657041d734a505a45ec822ec7eb5c25f2b0f1ba7e4c06403cffbc93b0f8cfbe91ae
-
SSDEEP
6144:j0Dd6+SD+dYnY9cCxaTVfbtTkyrfX4y2NRxzCOfKKm8V:AM+SD+2n7CxaRbjrfX4yURJm
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-