Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 06:07
Behavioral task
behavioral1
Sample
JaffaCakes118_9576d02a063672b2dda3060dc50cada3f1f8766b6986b8b47193e3df8b495c8e.pdf
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_9576d02a063672b2dda3060dc50cada3f1f8766b6986b8b47193e3df8b495c8e.pdf
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
cs_sb.exe
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
cs_sb.exe
Resource
win10v2004-20241007-en
General
-
Target
cs_sb.exe
-
Size
72KB
-
MD5
2a046253dbeefd2ec9ac226a31f9665f
-
SHA1
2b6c9d9a9d2b75772ce14f875791fb4fa9417429
-
SHA256
335563701953af482f55eb521dce276a2fb1f737a041261ca823ac62d75ac7c3
-
SHA512
ae7e0cab9aef11bb2c14aad3329210c005e7b78b9c69bfe2b232b16cc870a233c9b6731e142bf8412b40d1cc83aaf9cd306fc4709d53d1cfed7b32699460bbff
-
SSDEEP
1536:I02zlSvWmCbYnIEcSB5tDXMb+KR0Nc8QsJq39:W0vWmCUnIeDDe0Nc8QsC9
Malware Config
Extracted
metasploit
windows/reverse_tcp
5.6.7.8:443
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cs_sb.exe