Behavioral task
behavioral1
Sample
3139120cba565814409865d35675d1da_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3139120cba565814409865d35675d1da_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3139120cba565814409865d35675d1da_JaffaCakes118
-
Size
112KB
-
MD5
3139120cba565814409865d35675d1da
-
SHA1
1072c5b107e5078480e941d141ef7907ad07990f
-
SHA256
88f54e6ecb3a0819bc1b28d384751a82298379d7ea8daee05e1c93e70cba2586
-
SHA512
2d93e0757db18eaca264f42705ddfa172919e652920bb994e81bf4c4ae02ba91bfcefc54e08d172794d255ef708cd72c03e857fa1d73360d77ac7235e68113b1
-
SSDEEP
3072:VQLm6GkLB80OnjUi6kJO6HptiyIIIIIIIIIIYIIIT5:CLOkt80IVK4
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.2.101:443
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3139120cba565814409865d35675d1da_JaffaCakes118
Files
-
3139120cba565814409865d35675d1da_JaffaCakes118.exe windows:4 windows x86 arch:x86
b5e52413f62e0a75b919797e2900f007
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
CreateProcessW
lstrlenA
FlushFileBuffers
CloseHandle
CreateFileA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
GetLastError
GetModuleHandleA
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
RaiseException
Sleep
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
LoadLibraryA
InitializeCriticalSection
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
CoInitializeSecurity
CoSetProxyBlanket
oleaut32
SysFreeString
VariantClear
SysAllocString
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ