General
-
Target
JaffaCakes118_955b74dfb09b447254f29aab492ce709
-
Size
281KB
-
Sample
250329-ydqy7swlx4
-
MD5
955b74dfb09b447254f29aab492ce709
-
SHA1
46e98f0ea9e3274ec3411c7550edcbcf9d99039e
-
SHA256
d6c785ddd37a6cb6c0d6cbdd3dea85bb58e14c21e6969891bcf32c66a601c1be
-
SHA512
2d52a9824c9bf3eaeb666e70df2a2f4029a55765bcfdc27dde8067afc22747f7f40a0c5c63d5b45f3e0b7298e45a14eefcce795f4448986fa6bfcee4eb782677
-
SSDEEP
6144:Hb30Xv5Mq6KhWOqjn2yDwsTA6FdcP2ovWZ3jmodsFljac:Hq5ZVWOqjnpDdAedM7v+hdklja
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_955b74dfb09b447254f29aab492ce709.exe
Resource
win10v2004-20250314-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
JaffaCakes118_955b74dfb09b447254f29aab492ce709
-
Size
281KB
-
MD5
955b74dfb09b447254f29aab492ce709
-
SHA1
46e98f0ea9e3274ec3411c7550edcbcf9d99039e
-
SHA256
d6c785ddd37a6cb6c0d6cbdd3dea85bb58e14c21e6969891bcf32c66a601c1be
-
SHA512
2d52a9824c9bf3eaeb666e70df2a2f4029a55765bcfdc27dde8067afc22747f7f40a0c5c63d5b45f3e0b7298e45a14eefcce795f4448986fa6bfcee4eb782677
-
SSDEEP
6144:Hb30Xv5Mq6KhWOqjn2yDwsTA6FdcP2ovWZ3jmodsFljac:Hq5ZVWOqjnpDdAedM7v+hdklja
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Loads dropped DLL
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-