Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 17:18
Static task
static1
Behavioral task
behavioral1
Sample
ec90404ff944759a356b808a6cba5bdc_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec90404ff944759a356b808a6cba5bdc_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ec90404ff944759a356b808a6cba5bdc_JaffaCakes118.exe
-
Size
106KB
-
MD5
ec90404ff944759a356b808a6cba5bdc
-
SHA1
6b297af23350824384295b3e7a49b36a1366ed4b
-
SHA256
b530a206cac47507285d4baf51f8385498d03986d722b9134d137e71eac6cbca
-
SHA512
057885396e39b52e46d239b53010493a8596adece3e1c19272f6e21167200f336f987ebbe2dce8abb512283767c494b2cd7b7c9ed776a00c2253b173d68af1ee
-
SSDEEP
3072:W6GHlnAZkpAN445Lslg1oEy4RXaUCmwIiaRCUJX0:Q6Nj5LInmwIftX
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2080 ec90404ff944759a356b808a6cba5bdc_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2080 ec90404ff944759a356b808a6cba5bdc_JaffaCakes118.exe