Analysis
-
max time kernel
118s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
02-07-2024 04:19
Behavioral task
behavioral1
Sample
1dfa0f2269318026d980eea64092fa0e_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1dfa0f2269318026d980eea64092fa0e_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1dfa0f2269318026d980eea64092fa0e_JaffaCakes118.exe
-
Size
46KB
-
MD5
1dfa0f2269318026d980eea64092fa0e
-
SHA1
ba69e919ece01489f9f7e8ef78840ffcb1b82b2c
-
SHA256
b77403398535de58159e4d5ba2ae37a306282128698bbd364f7902db4dae43db
-
SHA512
cee5141fce5bd2235d50397253311d3ba7b7e10000cce5dcf0177c6816483dbc94f1fc911068ec13efa41d98e89d819699fbd83fe5b57a211afafcf6dbcf5751
-
SSDEEP
768:IuccVmaaPy9CyuJqpaRt9iZ1sq+K7Hhk1WQt34B55Hq3:IAV4HaZ17+8Etonpq3
Malware Config
Extracted
metasploit
windows/shell_reverse_tcp
192.168.56.1:31337
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Processes:
resource yara_rule behavioral1/memory/2436-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral1/memory/2436-2-0x0000000000400000-0x0000000000419000-memory.dmp upx