General
-
Target
JaffaCakes118_b96adc6ab75fe4caff4e8c2cc0bb1f80
-
Size
192KB
-
Sample
250415-gtzslss1ay
-
MD5
b96adc6ab75fe4caff4e8c2cc0bb1f80
-
SHA1
b0ca42d369f0dbf0f5de1790c9ee7426a020eef0
-
SHA256
f6b09658c8949c969d17881eea8e7e5288a93c5f2074731579712e4a6658b72a
-
SHA512
cf01cc88aa61c20aaaeb719928138a0d37faa9384b0cf2b600e9846f7f7e6e0f1728bfc64482e5383f06ac143a02fceda36188436b121e8930d6ce73bc82b91f
-
SSDEEP
3072:P8CASbrfeSrZslbiZZ+PiMs5V1McooCY76jmBf5f/ttuuSG8kTvjCP307u4wi3Yn:P7ASnfz/Z+PiMs3WXoCYWjchf/frSG8R
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_b96adc6ab75fe4caff4e8c2cc0bb1f80.exe
Resource
win10v2004-20250410-en
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Targets
-
-
Target
JaffaCakes118_b96adc6ab75fe4caff4e8c2cc0bb1f80
-
Size
192KB
-
MD5
b96adc6ab75fe4caff4e8c2cc0bb1f80
-
SHA1
b0ca42d369f0dbf0f5de1790c9ee7426a020eef0
-
SHA256
f6b09658c8949c969d17881eea8e7e5288a93c5f2074731579712e4a6658b72a
-
SHA512
cf01cc88aa61c20aaaeb719928138a0d37faa9384b0cf2b600e9846f7f7e6e0f1728bfc64482e5383f06ac143a02fceda36188436b121e8930d6ce73bc82b91f
-
SSDEEP
3072:P8CASbrfeSrZslbiZZ+PiMs5V1McooCY76jmBf5f/ttuuSG8kTvjCP307u4wi3Yn:P7ASnfz/Z+PiMs3WXoCYWjchf/frSG8R
Score10/10-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Deletes itself
-
Executes dropped EXE
-
Maps connected drives based on registry
Disk information is often read in order to detect sandboxing environments.
-
Drops file in System32 directory
-
Suspicious use of SetThreadContext
-