Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 10:34
Behavioral task
behavioral1
Sample
JaffaCakes118_6e27da57eb953b5b285e2a8068c1dd69147c06e92c6acb92fe97ee515fb16fc9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6e27da57eb953b5b285e2a8068c1dd69147c06e92c6acb92fe97ee515fb16fc9.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6e27da57eb953b5b285e2a8068c1dd69147c06e92c6acb92fe97ee515fb16fc9.exe
-
Size
1KB
-
MD5
574472decb54da77022fd05e4aa5e6c1
-
SHA1
b6532e1083de00796b1e29d74453d06f1e341fee
-
SHA256
6e27da57eb953b5b285e2a8068c1dd69147c06e92c6acb92fe97ee515fb16fc9
-
SHA512
9d268953c8828838b95bffcdaf49e4c1b63a796aa09444ab0ad6ebe20747a9010f11606f9e027bcf686f56810ecff7c14e63898ad80e9d68fe148c355d3e8c50
Malware Config
Extracted
metasploit
windows/download_exec
http://175.178.239.127:80/comm/change/RDS3S6X8
- headers Accept: image/*, text/html, application/xhtml+xml Accept-Language: ro-md Accept-Encoding: gzip, compress User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/48.0.2564.82 Safari/537.36
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6e27da57eb953b5b285e2a8068c1dd69147c06e92c6acb92fe97ee515fb16fc9.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e27da57eb953b5b285e2a8068c1dd69147c06e92c6acb92fe97ee515fb16fc9.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6e27da57eb953b5b285e2a8068c1dd69147c06e92c6acb92fe97ee515fb16fc9.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2400