General
-
Target
JaffaCakes118_b9365eee02d5771b68ff81312f660664
-
Size
292KB
-
Sample
250415-clpv8awp14
-
MD5
b9365eee02d5771b68ff81312f660664
-
SHA1
4dbfc852bb74d0c09822cd9480f48170b431e4f8
-
SHA256
63abf69ef5c6bf8173602b97939bfefe4967fa4b810872347134f1355e4aba16
-
SHA512
4c47d654b0db4f3fc7c4ba21df8ea240d15e7b2ad74432d37eb569e99a48605ab722c8acc5ddd9fd7a84d535d8ceaaa4a080c6d9f79df3239fb2a4bc041141be
-
SSDEEP
3072:imWMBqx6iXMYISKK05UVq09dY0OxMmgHnou+9JThe/RhE/Mrrq302fc6RrH:imW6FYEz5UVq09dYpxjgHaTzknGlFH
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b9365eee02d5771b68ff81312f660664.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
JaffaCakes118_b9365eee02d5771b68ff81312f660664
-
Size
292KB
-
MD5
b9365eee02d5771b68ff81312f660664
-
SHA1
4dbfc852bb74d0c09822cd9480f48170b431e4f8
-
SHA256
63abf69ef5c6bf8173602b97939bfefe4967fa4b810872347134f1355e4aba16
-
SHA512
4c47d654b0db4f3fc7c4ba21df8ea240d15e7b2ad74432d37eb569e99a48605ab722c8acc5ddd9fd7a84d535d8ceaaa4a080c6d9f79df3239fb2a4bc041141be
-
SSDEEP
3072:imWMBqx6iXMYISKK05UVq09dY0OxMmgHnou+9JThe/RhE/Mrrq302fc6RrH:imW6FYEz5UVq09dYpxjgHaTzknGlFH
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-