Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 22:06
Behavioral task
behavioral1
Sample
e87eeda150caff7441fd748696b348cb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e87eeda150caff7441fd748696b348cb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e87eeda150caff7441fd748696b348cb_JaffaCakes118.exe
-
Size
20KB
-
MD5
e87eeda150caff7441fd748696b348cb
-
SHA1
ef49e2840d5d77ab99d2a0f138983e79f6bcd5f9
-
SHA256
cb1de91ea0ebe0c5cc069647c7d863d5428299941a8611488a1f894f55d06cd9
-
SHA512
8bce59dfb1d2af33519e46d31274db414e420c462911cd3c09090c2d7fe4095b52c4fae819853c6863735bb167788f8e630e6c749f13dfad9fddf8dcdbe99240
-
SSDEEP
192:+HEPQUaknpG0ugsJjxXvNX0lFNnTLFffQBnmQUMLw6uh3DW94UgZgXFzCN4C:KJ4pPugsBxXh0xnTLlYBmQUaE5gEl
Malware Config
Extracted
metasploit
windows/download_exec
http://192.168.1.111:8081/ApaET
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e87eeda150caff7441fd748696b348cb_JaffaCakes118.exe