General
-
Target
fbb6bc08014b892ac16cb0e20199cf4b_JaffaCakes118
-
Size
186KB
-
Sample
241218-qpvsja1qhn
-
MD5
fbb6bc08014b892ac16cb0e20199cf4b
-
SHA1
3b5c8814d593c8de22a2643198b87ea1226a0b1d
-
SHA256
0f8e47dbb41a50448109ccd3005c3d9866256c0f65d678b8ce06423c39176c69
-
SHA512
87f26a29c03608b856b893f7f31e1f621ccff294819c679efb00b912b9f1d81f3e78dd55508fdc0c4b42b6a906a90468c1409ca433f3caef1d7f1625263330a7
-
SSDEEP
3072:uPhMkJih11qfY5owW3zb/pJ4H8YsDkDajm9JxY552YIJV7air:N1wf/oHKDjmTI8Jr
Static task
static1
Behavioral task
behavioral1
Sample
fbb6bc08014b892ac16cb0e20199cf4b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbb6bc08014b892ac16cb0e20199cf4b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
fbb6bc08014b892ac16cb0e20199cf4b_JaffaCakes118
-
Size
186KB
-
MD5
fbb6bc08014b892ac16cb0e20199cf4b
-
SHA1
3b5c8814d593c8de22a2643198b87ea1226a0b1d
-
SHA256
0f8e47dbb41a50448109ccd3005c3d9866256c0f65d678b8ce06423c39176c69
-
SHA512
87f26a29c03608b856b893f7f31e1f621ccff294819c679efb00b912b9f1d81f3e78dd55508fdc0c4b42b6a906a90468c1409ca433f3caef1d7f1625263330a7
-
SSDEEP
3072:uPhMkJih11qfY5owW3zb/pJ4H8YsDkDajm9JxY552YIJV7air:N1wf/oHKDjmTI8Jr
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies firewall policy service
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Adds Run key to start application
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
2