Analysis
-
max time kernel
105s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/01/2025, 06:36
Behavioral task
behavioral1
Sample
JaffaCakes118_6ad0d19de0d8409567399389c8432110.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_6ad0d19de0d8409567399389c8432110.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_6ad0d19de0d8409567399389c8432110.exe
-
Size
1024B
-
MD5
6ad0d19de0d8409567399389c8432110
-
SHA1
cffeb3a296d82561065b24b97b519dce6ac55e7f
-
SHA256
952ceeb42dea1a9037570320ea32ac9500bc19324a0373744f35b8002b03daae
-
SHA512
7751cb5b3a2adead439c26148f2f69000fd95b81e797c9fb45af6cdd6a38e91b3d3ed2cbde9dfd5a6776cc638e0ee5fd2acca317343cd74ce386c628802a3341
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.14.103:443
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_6ad0d19de0d8409567399389c8432110.exe