General
-
Target
df9bd3eca0da66909b314fe5d682220f_JaffaCakes118
-
Size
210KB
-
Sample
241211-dcs2ysspgt
-
MD5
df9bd3eca0da66909b314fe5d682220f
-
SHA1
5ebd4d7f6cac5e51b87a2212bf5e420d209f78e0
-
SHA256
e4aabda829135836bce43b9fddbaf733d3dbda6a2e8a9cb5844f95105950e5cf
-
SHA512
70695f5824e06fed2e59dd07f476dea031e6030de7be0d9c526319d20e2ebae56bf67dca7119bfdf85f4233fa43dfb12c27df810de7fa3ae5ef07f53506aeb0b
-
SSDEEP
3072:9ZVUyTavMYZZaHSkucAbwsH/Tb2s8iRfQVWnYDAew4xpRW8s1spD/0QL9KOEMtiu:joVZgHSkzQwO7iJQQVWYvvHsGZ/06N
Static task
static1
Behavioral task
behavioral1
Sample
df9bd3eca0da66909b314fe5d682220f_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
df9bd3eca0da66909b314fe5d682220f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
df9bd3eca0da66909b314fe5d682220f_JaffaCakes118
-
Size
210KB
-
MD5
df9bd3eca0da66909b314fe5d682220f
-
SHA1
5ebd4d7f6cac5e51b87a2212bf5e420d209f78e0
-
SHA256
e4aabda829135836bce43b9fddbaf733d3dbda6a2e8a9cb5844f95105950e5cf
-
SHA512
70695f5824e06fed2e59dd07f476dea031e6030de7be0d9c526319d20e2ebae56bf67dca7119bfdf85f4233fa43dfb12c27df810de7fa3ae5ef07f53506aeb0b
-
SSDEEP
3072:9ZVUyTavMYZZaHSkucAbwsH/Tb2s8iRfQVWnYDAew4xpRW8s1spD/0QL9KOEMtiu:joVZgHSkzQwO7iJQQVWYvvHsGZ/06N
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-