Analysis
-
max time kernel
105s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2024 14:04
Behavioral task
behavioral1
Sample
e1cc040223663562e83dea1279b829ca_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1cc040223663562e83dea1279b829ca_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e1cc040223663562e83dea1279b829ca_JaffaCakes118.exe
-
Size
472KB
-
MD5
e1cc040223663562e83dea1279b829ca
-
SHA1
6091f144bc7b78374323f38a991d326aca887390
-
SHA256
fc2e842ceded11ee14f28f97c939bd3ae88c76229d925911e254be9d932fa4db
-
SHA512
a3fe9e3434d8bccadb384d9433d406fa73ed3a5bf634ba7115c32003e68b6dda81d79b876281a2c752b52da524d487a49717d9d11bab0941c6d20c9c200dcbd0
-
SSDEEP
12288:CW0mYCeiqDLYI1W/re5IFz3rV7FiTO9StnsBW+jnV6I:QzCD1I1WDq4rV7FiTvnsMwV6
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.25.180:8080
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e1cc040223663562e83dea1279b829ca_JaffaCakes118.exe