Analysis
-
max time kernel
105s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20250410-en -
resource tags
arch:x64arch:x86image:win10v2004-20250410-enlocale:en-usos:windows10-2004-x64system -
submitted
14/04/2025, 18:01
Behavioral task
behavioral1
Sample
JaffaCakes118_b890754b74bb8e49cbf4d3a5b4569dd5.exe
Resource
win10v2004-20250410-en
General
-
Target
JaffaCakes118_b890754b74bb8e49cbf4d3a5b4569dd5.exe
-
Size
72KB
-
MD5
b890754b74bb8e49cbf4d3a5b4569dd5
-
SHA1
29bef8b8430059ac08894352a48666bdc9558303
-
SHA256
3b955c84d26a3f53f157ccfb5a1c9ce4426972e5c9415982cdc5522b8e09290f
-
SHA512
da54670e711cf7cb1222213f42420eec16f80b8fae8dd46d51c8cc80595319815f7ac7e2a34344706cfed433d401aff1562281d0e69766c4d94c376fdd8751c1
-
SSDEEP
1536:IrUgTrQoiIEaUMNS4t7vyc42QC9vD7tBmMMb+KR0Nc8QsJq39:yU8xivaUM17vN42VtBe0Nc8QsC9
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.76.128:4444
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_b890754b74bb8e49cbf4d3a5b4569dd5.exe