General
-
Target
dc8977a16719dab70a36d4bd0f1a7ea2_JaffaCakes118
-
Size
158KB
-
Sample
241210-cmk9esvnaq
-
MD5
dc8977a16719dab70a36d4bd0f1a7ea2
-
SHA1
2677b74ee837fb78a794d8cae7fa41c6ca1bbf14
-
SHA256
0eba4a332cb162f33e0368f1fac0f01a2cd72873055a7485413f536a44aa0218
-
SHA512
70c95a1bd048b1b397d580505e08f2d3d934b09f4bab0372ff060fe26c6111a391676ebd59befb44309043c76df3ec6af84a64bf7fd31a3642b7e4ad43040a10
-
SSDEEP
3072:zv5lmIoUsJiRvjAZrrF7EJXBPCisvrbviOkAgJQj:zxnoULRvEVlEvAvP1KQ
Static task
static1
Behavioral task
behavioral1
Sample
dc8977a16719dab70a36d4bd0f1a7ea2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dc8977a16719dab70a36d4bd0f1a7ea2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
dc8977a16719dab70a36d4bd0f1a7ea2_JaffaCakes118
-
Size
158KB
-
MD5
dc8977a16719dab70a36d4bd0f1a7ea2
-
SHA1
2677b74ee837fb78a794d8cae7fa41c6ca1bbf14
-
SHA256
0eba4a332cb162f33e0368f1fac0f01a2cd72873055a7485413f536a44aa0218
-
SHA512
70c95a1bd048b1b397d580505e08f2d3d934b09f4bab0372ff060fe26c6111a391676ebd59befb44309043c76df3ec6af84a64bf7fd31a3642b7e4ad43040a10
-
SSDEEP
3072:zv5lmIoUsJiRvjAZrrF7EJXBPCisvrbviOkAgJQj:zxnoULRvEVlEvAvP1KQ
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service
-
Modifies Windows Firewall
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
2Disable or Modify Tools
2Modify Registry
3