Analysis
-
max time kernel
14s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 21:37
Behavioral task
behavioral1
Sample
ecd44c27541b74bf877a85db0fd2812f_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ecd44c27541b74bf877a85db0fd2812f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ecd44c27541b74bf877a85db0fd2812f_JaffaCakes118.exe
-
Size
158KB
-
MD5
ecd44c27541b74bf877a85db0fd2812f
-
SHA1
fb6ef6ae8b1df2e0fc48a471d07102a14f580424
-
SHA256
a8a24fedaa7e19688b28c358b48d8e4d99eede8d79cdb22b9fc4a80d6c011009
-
SHA512
670fa4d353a4d90500dfa71700aa4cf9829e720074f3791b547420b56b64dc536428f36178f254bb29d069e29101614faf3362d5fd5741e72ba9eece5730ea8c
-
SSDEEP
3072:ozqTC/VXu6w+e0Nc8QsCKeJBGFvaAkJHGx4i8vLV0d/xbgVWj8aoAX:8qGdXu6wh0Nc8QsBKQvaJEYmdmVWIaz
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family