General
-
Target
f8fc912b137cacf268f49710fbc3e408_JaffaCakes118
-
Size
168KB
-
Sample
241217-1qqv3syqfw
-
MD5
f8fc912b137cacf268f49710fbc3e408
-
SHA1
ef067fb48af476cd3f1c66a22ed16e91cf103456
-
SHA256
84f1996cf4782d1895b6f92426f8479ece39c94b1b01a940b01ba01d8ddb9a90
-
SHA512
c72ce5fcb44133c76eae8bfc850e9c47b921da1602c20b38a0777fc2347e060540459625ce65855dee402be63bba7344f525153a2f310002a870076edf879ac0
-
SSDEEP
3072:dIM4k11DfZS5/Y+oj6i4LNjAlZ20n6sYAoB+E5+N6fKRZj0A28AnTPln5pMGDqOd:aG11DfEY+m65JAms9V30foZj0L8An7lX
Static task
static1
Behavioral task
behavioral1
Sample
f8fc912b137cacf268f49710fbc3e408_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f8fc912b137cacf268f49710fbc3e408_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
f8fc912b137cacf268f49710fbc3e408_JaffaCakes118
-
Size
168KB
-
MD5
f8fc912b137cacf268f49710fbc3e408
-
SHA1
ef067fb48af476cd3f1c66a22ed16e91cf103456
-
SHA256
84f1996cf4782d1895b6f92426f8479ece39c94b1b01a940b01ba01d8ddb9a90
-
SHA512
c72ce5fcb44133c76eae8bfc850e9c47b921da1602c20b38a0777fc2347e060540459625ce65855dee402be63bba7344f525153a2f310002a870076edf879ac0
-
SSDEEP
3072:dIM4k11DfZS5/Y+oj6i4LNjAlZ20n6sYAoB+E5+N6fKRZj0A28AnTPln5pMGDqOd:aG11DfEY+m65JAms9V30foZj0L8An7lX
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-