Analysis
-
max time kernel
122s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
31/12/2024, 06:59
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_09bead43743c8cda155dcb4c109cf416.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_09bead43743c8cda155dcb4c109cf416.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_09bead43743c8cda155dcb4c109cf416.exe
-
Size
50KB
-
MD5
09bead43743c8cda155dcb4c109cf416
-
SHA1
30e3ce2b45aa62dd777e2dd15adcc148d7be30d4
-
SHA256
48469406ec5f3c4cd023b300441e3c63c2e75798be8d3e1a8fbf80f5ba3768b8
-
SHA512
dd0d4fdbd5a0108a7f4818ef895da23ef584657d16f60120dfb056bf10022e00fabd9148f085b570973d8fe2aea22ff8b0af6dce2d9ab86b204d589920e5d36f
-
SSDEEP
768:VkHQF1YCzsFmvrPaNqVPJKW3cEoxgtLPILaNilcpXcKpUu5ovyavoc:Ww5bzJPYm1P8a82phpUYiya
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_09bead43743c8cda155dcb4c109cf416.exe