General
-
Target
d8a234c55b61536b5c33c855d58ebd04_JaffaCakes118
-
Size
749KB
-
Sample
241209-jwexbswmen
-
MD5
d8a234c55b61536b5c33c855d58ebd04
-
SHA1
d73a64e47f6ba3a039b283e58a3c14c0ed51b198
-
SHA256
0646b625fdc45430d811f7d90877913d256681c50e6bab965f0a463cab0ac178
-
SHA512
3843931316131ae15875bf08646d7dae8377bcc21ee5099016e0a7e4822948f8be8fd4cf1388b00cb4ba2cbd8cf4fa237751679777b2be5dd0dd780daa73fd8d
-
SSDEEP
12288:rARl8TY343PWjChiK5WArjld1RmL9UmmnMCRsRKHChWbOEyFwHDGEDzlVq71QaW:kRlBjadFdmL9hVCRsRKihCySHDGQVqWJ
Static task
static1
Behavioral task
behavioral1
Sample
d8a234c55b61536b5c33c855d58ebd04_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d8a234c55b61536b5c33c855d58ebd04_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
d8a234c55b61536b5c33c855d58ebd04_JaffaCakes118
-
Size
749KB
-
MD5
d8a234c55b61536b5c33c855d58ebd04
-
SHA1
d73a64e47f6ba3a039b283e58a3c14c0ed51b198
-
SHA256
0646b625fdc45430d811f7d90877913d256681c50e6bab965f0a463cab0ac178
-
SHA512
3843931316131ae15875bf08646d7dae8377bcc21ee5099016e0a7e4822948f8be8fd4cf1388b00cb4ba2cbd8cf4fa237751679777b2be5dd0dd780daa73fd8d
-
SSDEEP
12288:rARl8TY343PWjChiK5WArjld1RmL9UmmnMCRsRKHChWbOEyFwHDGEDzlVq71QaW:kRlBjadFdmL9hVCRsRKihCySHDGQVqWJ
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Drops file in Drivers directory
-
Checks BIOS information in registry
BIOS information is often read in order to detect sandboxing environments.
-
Identifies Wine through registry keys
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
-