Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    25-12-2024 00:36

General

  • Target

    JaffaCakes118_06367d85bf011aff65ddbb3e6c01dd62584486393a1ffe3d1ccad305351311a6.exe

  • Size

    4KB

  • MD5

    a35330a1d890786efc759706c8ba9fa3

  • SHA1

    7eb08d2be69b6b1ddf3afec1183a72f3f9caa3da

  • SHA256

    06367d85bf011aff65ddbb3e6c01dd62584486393a1ffe3d1ccad305351311a6

  • SHA512

    8a63bffb3945949019bce8f97d34be6296dd34418eed157a1ab10c80506b2953170d15e65246167ef0624544f2db48b9454ad6a7405b6ee4d926eea2f1b75455

  • SSDEEP

    96:nAalGUIsu5kkCyEqAylIESFhpWDAqIBc/cwarVwDhqw:/Gf3CyEqADE4tB8aJwDMw

Malware Config

Extracted

Family

metasploit

Version

windows/exec

Signatures

  • MetaSploit

    Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.

  • Metasploit family

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_06367d85bf011aff65ddbb3e6c01dd62584486393a1ffe3d1ccad305351311a6.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_06367d85bf011aff65ddbb3e6c01dd62584486393a1ffe3d1ccad305351311a6.exe"
    1⤵
      PID:2756

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2756-0-0x0000000000400000-0x0000000000404000-memory.dmp

      Filesize

      16KB