General
-
Target
f121bdda0e29e4b18aa1865c25abaaed_JaffaCakes118
-
Size
84KB
-
Sample
241214-22gbfsynej
-
MD5
f121bdda0e29e4b18aa1865c25abaaed
-
SHA1
4efa5b6f122641a0ba97ff17e0e0dae5fa15b308
-
SHA256
d86929b6c61ac29452b8b3028a1b80cfaf46e64072c2ae4aa641322781c661d5
-
SHA512
bc99d0a0bfb9e2a0d0a52eb8f6abce7c9329dea9c350eb337c882e9b3d57540cad86b5274e6592db6b90ef759fb1a22d8d00169b891ffe31449b13dbc0bdf7ab
-
SSDEEP
768:/8rOiefXTMwAOfzjktwKD03y7XktU3+B35JoMh5vorG4wKEjJzc1qZl0sSK:/jJfLzzJKDiyEUQ3NvoC+8c1Sv
Static task
static1
Behavioral task
behavioral1
Sample
f121bdda0e29e4b18aa1865c25abaaed_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f121bdda0e29e4b18aa1865c25abaaed_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
f121bdda0e29e4b18aa1865c25abaaed_JaffaCakes118
-
Size
84KB
-
MD5
f121bdda0e29e4b18aa1865c25abaaed
-
SHA1
4efa5b6f122641a0ba97ff17e0e0dae5fa15b308
-
SHA256
d86929b6c61ac29452b8b3028a1b80cfaf46e64072c2ae4aa641322781c661d5
-
SHA512
bc99d0a0bfb9e2a0d0a52eb8f6abce7c9329dea9c350eb337c882e9b3d57540cad86b5274e6592db6b90ef759fb1a22d8d00169b891ffe31449b13dbc0bdf7ab
-
SSDEEP
768:/8rOiefXTMwAOfzjktwKD03y7XktU3+B35JoMh5vorG4wKEjJzc1qZl0sSK:/jJfLzzJKDiyEUQ3NvoC+8c1Sv
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-