Analysis

  • max time kernel
    105s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15-12-2024 12:42

General

  • Target

    f40bce27ef9a2284436cf94b78364c34_JaffaCakes118.exe

  • Size

    217KB

  • MD5

    f40bce27ef9a2284436cf94b78364c34

  • SHA1

    1e9c390fb5c7ea0b895e98d5661e931f624abf33

  • SHA256

    a6abb8dca3a1e78e739c30a8a35528e8b37f574eac29ac4fba937ad4f7397689

  • SHA512

    e2c9b75ba45e117978c954970f8a08bcea54ccd3b39ada2a917cac7832d28cd325665e0e3f3efe30a945deec0702421a5d130f0e594c923a773e768963dff1d4

  • SSDEEP

    3072:YqpPWVkP2hxNWX0nho7utD98Tyjgm+VvQiv+4ZtyXBDeCTLOI9o:VhWVk+xNvho7ut5NjOvsD5L1

Malware Config

Extracted

Family

metasploit

Version

encoder/shikata_ga_nai

Extracted

Family

metasploit

Version

windows/shell_reverse_tcp

C2

192.168.2.15:443

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\f40bce27ef9a2284436cf94b78364c34_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f40bce27ef9a2284436cf94b78364c34_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    PID:1092

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1092-0-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB

  • memory/1092-1-0x00000000005F0000-0x00000000005F1000-memory.dmp

    Filesize

    4KB

  • memory/1092-2-0x0000000000400000-0x0000000000453000-memory.dmp

    Filesize

    332KB