c:\b\build\slave\chrome-official\build\src\build\Release\chrome_exe.pdb
Behavioral task
behavioral1
Sample
3c03c376f7fa563adb39c60f7681270b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3c03c376f7fa563adb39c60f7681270b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3c03c376f7fa563adb39c60f7681270b_JaffaCakes118
-
Size
1.2MB
-
MD5
3c03c376f7fa563adb39c60f7681270b
-
SHA1
8799dc133ada9f6503de35b3117185362e394750
-
SHA256
fc5f03b75fd4be6957397f7b49f13bdddcda1b839b76d76308f2643a13ec666b
-
SHA512
d8d0cc2b7b281da0b5a38ae09b3fe7f02e7940a78eedf0e9849fe0e632fed75f6c1af5a5776039468128926510d66dceb48772b8730254facb31252b96cbc80e
-
SSDEEP
24576:2OgQGO3kp8JsGB8trNgdycisQj0d7Y15JhyjQulAKPw+Ii:fJ3kp8JsHrNgAcisQj0GvgQulAKPLr
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/reverse_ipv6_tcp
[fe80::5efe:c0a8:3865]:31337
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3c03c376f7fa563adb39c60f7681270b_JaffaCakes118
Files
-
3c03c376f7fa563adb39c60f7681270b_JaffaCakes118.exe windows:5 windows x86 arch:x86
89ba19807dd1d7162edf5cdcd947d370
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
shlwapi
PathRemoveFileSpecW
PathFileExistsW
kernel32
WaitForSingleObject
SetLastError
GetLastError
InitializeCriticalSection
TerminateJobObject
SetEvent
GetQueuedCompletionStatus
ResetEvent
DuplicateHandle
GetCurrentThreadId
CreateThread
CreateEventW
CreateIoCompletionPort
DeleteCriticalSection
PostQueuedCompletionStatus
InterlockedExchange
SignalObjectAndWait
SetHandleInformation
GetProcessHandleCount
VirtualFree
LocalFree
ResumeThread
FreeLibrary
LoadLibraryW
WriteProcessMemory
MapViewOfFile
CreateFileMappingW
VirtualAllocEx
VirtualQueryEx
GetExitCodeProcess
GetThreadContext
AssignProcessToJobObject
InterlockedIncrement
InterlockedDecrement
UnregisterWaitEx
RegisterWaitForSingleObject
VirtualFreeEx
VirtualProtectEx
CreateFileW
GetLongPathNameW
GetFileAttributesW
QueryDosDeviceW
CreateJobObjectW
CreateMutexW
GetCurrentProcessId
CreateNamedPipeW
OpenEventW
SearchPathW
GetCurrentDirectoryW
DebugBreak
lstrlenW
VirtualQuery
ReadProcessMemory
SuspendThread
ReleaseSemaphore
RtlCaptureContext
CreateSemaphoreW
WaitNamedPipeW
WaitForMultipleObjects
WriteFile
TransactNamedPipe
SetNamedPipeHandleState
SystemTimeToFileTime
QueryPerformanceCounter
GetSystemTimeAsFileTime
TzSpecificLocalTimeToSystemTime
QueryPerformanceFrequency
SetFilePointer
FormatMessageA
ReleaseMutex
ExpandEnvironmentStringsW
UnmapViewOfFile
SetInformationJobObject
VirtualAlloc
GetFileTime
SetEnvironmentVariableW
WideCharToMultiByte
MultiByteToWideChar
GetUserDefaultLangID
GetNativeSystemInfo
GetVersionExW
RaiseException
IsDebuggerPresent
InterlockedExchangeAdd
InitializeCriticalSectionAndSpinCount
SetEndOfFile
FlushFileBuffers
TlsGetValue
TlsSetValue
TlsAlloc
TlsFree
GetStdHandle
RtlCaptureStackBackTrace
SizeofResource
LockResource
LoadResource
FindResourceW
WTSGetActiveConsoleSessionId
UnhandledExceptionFilter
GetStartupInfoW
HeapFree
LoadLibraryA
HeapAlloc
GetConsoleCP
GetConsoleMode
GetProcessHeap
SetStdHandle
GetFileType
HeapReAlloc
GetCPInfo
RtlUnwind
LCMapStringA
LCMapStringW
GetStringTypeW
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapCreate
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetLocaleInfoW
CreateFileA
CompareStringA
CompareStringW
SetEnvironmentVariableA
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetTickCount
GetModuleHandleW
GetCurrentProcess
GetUserDefaultUILanguage
GetSystemDirectoryW
GetWindowsDirectoryW
LocalAlloc
GetThreadLocale
QueueUserWorkItem
GetTempPathW
GetCommandLineW
CreateProcessW
CloseHandle
SetUnhandledExceptionFilter
ExitProcess
InterlockedCompareExchange
Sleep
GetModuleHandleA
GetProcAddress
SetCurrentDirectoryW
LoadLibraryExW
GetEnvironmentVariableW
GetModuleFileNameW
ReadFile
user32
CharUpperW
GetUserObjectInformationW
GetThreadDesktop
SetProcessWindowStation
CreateDesktopW
GetProcessWindowStation
CreateWindowStationW
CloseDesktop
CloseWindowStation
MessageBoxW
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
wtsapi32
WTSQueryUserToken
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
winmm
timeGetTime
advapi32
InitializeSecurityDescriptor
RegOpenKeyExW
RegDisablePredefinedCache
RevertToSelf
SetSecurityInfo
GetSecurityDescriptorSacl
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetTokenInformation
GetLengthSid
ConvertStringSidToSidW
OpenProcessToken
SetThreadToken
CreateProcessAsUserW
RegCreateKeyExW
CreateRestrictedToken
DuplicateTokenEx
DuplicateToken
SetSecurityDescriptorDacl
EqualSid
GetTokenInformation
LookupPrivilegeValueW
CopySid
CreateWellKnownSid
GetSecurityInfo
GetFileSecurityW
ConvertSecurityDescriptorToStringSecurityDescriptorW
SetFileSecurityW
RegisterTraceGuidsW
GetTraceEnableLevel
UnregisterTraceGuids
TraceEvent
GetTraceLoggerHandle
GetTraceEnableFlags
ConvertSidToStringSidW
RegSetValueExW
RegEnumKeyExW
SetEntriesInAclW
RegQueryValueExW
RegQueryInfoKeyW
RegDeleteValueW
RegCloseKey
Exports
Exports
CrashForException
DumpProcess
DumpProcessWithoutCrash
SetActiveURL
SetClientId
SetCommandLine
SetExtensionID
SetGpuInfo
SetNumberOfExtensions
SetNumberOfViews
Sections
.text Size: 616KB - Virtual size: 615KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 352KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 171KB - Virtual size: 171KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Rimx Size: 4KB - Virtual size:
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ