Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2025, 00:32
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_6926e15c889f437925ae2843dff434b0.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6926e15c889f437925ae2843dff434b0.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6926e15c889f437925ae2843dff434b0.exe
-
Size
51KB
-
MD5
6926e15c889f437925ae2843dff434b0
-
SHA1
b69c0393bec5cf9edfd148e8a270a406be01232e
-
SHA256
3dc75acfcc777ad48d80c661bfaa8bacd1c3dec60a5d0c2b1d3cff1430a0c7d7
-
SHA512
bdda6620abbc5664fc769ab04b4e2e82e91149968b0228cfc59766c834bcbab3efd0b0cf809b79c5c4476b559576a6a7c3db2ab9249a7540cc7f582bc178a4f9
-
SSDEEP
768:GpSG0eNVdv4AIUS7FBBBpH4RwHRifkUPYLvyvT0NLCTBN3W:GeaVF40cB3H4Rkif6LKL0NOTi
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6926e15c889f437925ae2843dff434b0.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1436 JaffaCakes118_6926e15c889f437925ae2843dff434b0.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1436 JaffaCakes118_6926e15c889f437925ae2843dff434b0.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6926e15c889f437925ae2843dff434b0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_6926e15c889f437925ae2843dff434b0.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious behavior: RenamesItself
PID:1436