Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 00:55
Behavioral task
behavioral1
Sample
JaffaCakes118_bae9f9071147411631f99d8313714d1978ebe3ddb24b3d66efbd780baed57ff7.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
JaffaCakes118_bae9f9071147411631f99d8313714d1978ebe3ddb24b3d66efbd780baed57ff7.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_bae9f9071147411631f99d8313714d1978ebe3ddb24b3d66efbd780baed57ff7.exe
-
Size
1KB
-
MD5
81cfac3a377fc6aeca86e16a86b388d0
-
SHA1
b2fd69992abc5b997c147a00b4b1163d2055be07
-
SHA256
bae9f9071147411631f99d8313714d1978ebe3ddb24b3d66efbd780baed57ff7
-
SHA512
2e31f19de0c374c546e14abec9bebb02301028778e6e6fbfd1b39b6e48d9973f81eeac2949bd5a288496e4d74db3042055cb8ea1233f7d51c18efda10496ddf6
Malware Config
Extracted
metasploit
windows/download_exec
http://175.178.239.127:80/comm/change/RDS3S6X8
- headers Accept: image/*, text/html, application/xhtml+xml Accept-Language: ro-md Accept-Encoding: gzip, compress User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/48.0.2564.82 Safari/537.36
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_bae9f9071147411631f99d8313714d1978ebe3ddb24b3d66efbd780baed57ff7.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bae9f9071147411631f99d8313714d1978ebe3ddb24b3d66efbd780baed57ff7.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_bae9f9071147411631f99d8313714d1978ebe3ddb24b3d66efbd780baed57ff7.exe"1⤵
- System Location Discovery: System Language Discovery
PID:2968