General
-
Target
e3e0b74e2d14e388480dc26de90117d2_JaffaCakes118
-
Size
207KB
-
Sample
241212-asyqlatpbx
-
MD5
e3e0b74e2d14e388480dc26de90117d2
-
SHA1
b35ce09320299f313b1ebc4ca6cf95096b56257a
-
SHA256
820bd5e982f5c5aa89eb8a03df81d4e51025bb4a709cef479e53b4354d4fecb7
-
SHA512
42a45529b84afe6ddf22cf95af3518f478699e653745e862e30456a9d24e899a84b7445e813e2f1746a8f52fc224233b89ad628f45518d05de8e6a81bbed1039
-
SSDEEP
3072:ywvmIgMRQG6pO0TVAwMomXdKDf7vT4CiZ2kx:yGC+AWFN8vT41Z2k
Static task
static1
Behavioral task
behavioral1
Sample
e3e0b74e2d14e388480dc26de90117d2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e3e0b74e2d14e388480dc26de90117d2_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
e3e0b74e2d14e388480dc26de90117d2_JaffaCakes118
-
Size
207KB
-
MD5
e3e0b74e2d14e388480dc26de90117d2
-
SHA1
b35ce09320299f313b1ebc4ca6cf95096b56257a
-
SHA256
820bd5e982f5c5aa89eb8a03df81d4e51025bb4a709cef479e53b4354d4fecb7
-
SHA512
42a45529b84afe6ddf22cf95af3518f478699e653745e862e30456a9d24e899a84b7445e813e2f1746a8f52fc224233b89ad628f45518d05de8e6a81bbed1039
-
SSDEEP
3072:ywvmIgMRQG6pO0TVAwMomXdKDf7vT4CiZ2kx:yGC+AWFN8vT41Z2k
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-