General
-
Target
f73702d091e7640535dda117507da6be_JaffaCakes118
-
Size
88KB
-
Sample
241216-en8r8atkbs
-
MD5
f73702d091e7640535dda117507da6be
-
SHA1
07e42779ac99e0c4c60a1ea53de61355a76003fe
-
SHA256
7538634c7cb678ef803b4cded9f2bad9f554d17d1e4f106f94d8a54fd5ee40b9
-
SHA512
ed7252a896657a528f72e19fc2b5c0b1105e072fcc64510653e65b3e35a9c1ae2cdc91c1f3fba63bbbf86b948f0e2fe5f73224db6e98dca3c8fa51d11a0fc73b
-
SSDEEP
1536:b+iFaEtB4Y//aXoo7YMMHY638X7QTW3j/VFVi/MV2CJMfdT:b+iFaEtiY/iXooMMMh387CW3j/j4SAT
Static task
static1
Behavioral task
behavioral1
Sample
f73702d091e7640535dda117507da6be_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f73702d091e7640535dda117507da6be_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
f73702d091e7640535dda117507da6be_JaffaCakes118
-
Size
88KB
-
MD5
f73702d091e7640535dda117507da6be
-
SHA1
07e42779ac99e0c4c60a1ea53de61355a76003fe
-
SHA256
7538634c7cb678ef803b4cded9f2bad9f554d17d1e4f106f94d8a54fd5ee40b9
-
SHA512
ed7252a896657a528f72e19fc2b5c0b1105e072fcc64510653e65b3e35a9c1ae2cdc91c1f3fba63bbbf86b948f0e2fe5f73224db6e98dca3c8fa51d11a0fc73b
-
SSDEEP
1536:b+iFaEtB4Y//aXoo7YMMHY638X7QTW3j/VFVi/MV2CJMfdT:b+iFaEtiY/iXooMMMh387CW3j/j4SAT
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Suspicious use of SetThreadContext
-