Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2024, 04:29
Behavioral task
behavioral1
Sample
JaffaCakes118_04a853af099364ee614a404ddde343f3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_04a853af099364ee614a404ddde343f3.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_04a853af099364ee614a404ddde343f3.exe
-
Size
7KB
-
MD5
04a853af099364ee614a404ddde343f3
-
SHA1
c9a4dbd8aebff80b98e110310e454e6fb7546c78
-
SHA256
7e86929223da73cf275e38a0257e34bf64c690b6e5700cf1d120a23414c62495
-
SHA512
27d5118603e8b44b54e32f1ca0fc8d9428ffb8251403a04bf0694488b9e1cb3adb3d1997e8c15cba7c3d75924876693f2b82a6f3f520b421821f58288df194a0
-
SSDEEP
96:bz4a48MRZGbWrW60c7SNfBh+MhpYfgFF2cNoNfi+Py5YIo7aio7yHo7Vo7vzNt:bz0eW7n74fBQEhHrNoN6+TIy3HGq
Malware Config
Extracted
metasploit
metasploit_stager
192.168.50.227:443
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2816 wrote to memory of 4496 2816 JaffaCakes118_04a853af099364ee614a404ddde343f3.exe 83 PID 2816 wrote to memory of 4496 2816 JaffaCakes118_04a853af099364ee614a404ddde343f3.exe 83 PID 2816 wrote to memory of 4496 2816 JaffaCakes118_04a853af099364ee614a404ddde343f3.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04a853af099364ee614a404ddde343f3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_04a853af099364ee614a404ddde343f3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe2⤵PID:4496
-