General
-
Target
f6edfd7d41a37424ed76f18369251e52_JaffaCakes118
-
Size
145KB
-
Sample
241216-c6pqys1qek
-
MD5
f6edfd7d41a37424ed76f18369251e52
-
SHA1
8b76be608cc04b9c5d3cc96647c5147c8e3db220
-
SHA256
c55ad3b4d5d5791710bd6c7f311ab03673f372c69b7fc623fc0976d7d2740fd4
-
SHA512
ed3e8a0fcf4b7018e369fec57a357877e67938bbf0cf62d30e931262f6d964f9f3137f2ccc093f41a6a52976c90f640c9b626a814022fedab8e83477887b3918
-
SSDEEP
3072:JKor0NTdzvhsC2WIQ80FmnT20KHPy06oGZbSfxwQdeWkDJv4BAkpQsyIQnjQcCzf:nQNNvh980FmT2jK0YZbixwQdeWktAOkP
Static task
static1
Behavioral task
behavioral1
Sample
f6edfd7d41a37424ed76f18369251e52_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6edfd7d41a37424ed76f18369251e52_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
f6edfd7d41a37424ed76f18369251e52_JaffaCakes118
-
Size
145KB
-
MD5
f6edfd7d41a37424ed76f18369251e52
-
SHA1
8b76be608cc04b9c5d3cc96647c5147c8e3db220
-
SHA256
c55ad3b4d5d5791710bd6c7f311ab03673f372c69b7fc623fc0976d7d2740fd4
-
SHA512
ed3e8a0fcf4b7018e369fec57a357877e67938bbf0cf62d30e931262f6d964f9f3137f2ccc093f41a6a52976c90f640c9b626a814022fedab8e83477887b3918
-
SSDEEP
3072:JKor0NTdzvhsC2WIQ80FmnT20KHPy06oGZbSfxwQdeWkDJv4BAkpQsyIQnjQcCzf:nQNNvh980FmT2jK0YZbixwQdeWktAOkP
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service
-
Modifies Windows Firewall
-
Deletes itself
-
Executes dropped EXE
-
Drops file in System32 directory
-
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Create or Modify System Process
2Windows Service
2Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Impair Defenses
4Disable or Modify System Firewall
2Disable or Modify Tools
2Modify Registry
3