Behavioral task
behavioral1
Sample
16226711ec85c30d1a9050c3d1f9e7e4_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
16226711ec85c30d1a9050c3d1f9e7e4_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
16226711ec85c30d1a9050c3d1f9e7e4_JaffaCakes118
-
Size
148KB
-
MD5
16226711ec85c30d1a9050c3d1f9e7e4
-
SHA1
6f72f5d7b3e5d05941447f85a61bdc6afa8bdaa9
-
SHA256
de4672bb68b6b329f295cd1b95eb44c941f235b558303699c1f13c7cbc165acf
-
SHA512
ab842c3057d2b372565676072f1ab6458ac9e7f06fca2e60ccf4ff3af1e9b883942c98cdba0fdc9319804d431214581052b30f05e3cd3e2fecbe0612140b12c7
-
SSDEEP
768:/JB9gQW+wfKnTvDBMBVKkghuV5eI1qM8yBCw+L/i6mOy4gwogaMAsAOD:z15wSjDBwgUV5m1yIw4qeZogaMznD
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.137.250:8084
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16226711ec85c30d1a9050c3d1f9e7e4_JaffaCakes118
Files
-
16226711ec85c30d1a9050c3d1f9e7e4_JaffaCakes118.exe windows:4 windows x86 arch:x86
2723042ed455a89516dedd99d22c87ce
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineA
GetVersion
ExitProcess
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
GetLastError
SetConsoleCtrlHandler
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetCPInfo
GetACP
GetOEMCP
HeapAlloc
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetFilePointer
SetStdHandle
FlushFileBuffers
CloseHandle
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ