d:\work\druids\osaction-v2\Release\osaction_v2_m2.pdb
Behavioral task
behavioral1
Sample
76494ab107a120c14034b609a4066ebe_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
76494ab107a120c14034b609a4066ebe_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
76494ab107a120c14034b609a4066ebe_JaffaCakes118
-
Size
257KB
-
MD5
76494ab107a120c14034b609a4066ebe
-
SHA1
8b56334342b5b7c7769899151bda77920107d699
-
SHA256
c233a58f78764a4adc731aaaa9fc75767c12184aac4d699a977cef6610f36612
-
SHA512
1b883ce244239dfe63c6d3f4f7c298297ae7dc5ef5d7ac2ca266e7e3f9f043e208e97d5ea46f65c5206f12077c505458b93ea78a575a824e225527dcc00e6274
-
SSDEEP
3072:FegdLJPXfQjMkXpnpb3PK8vGz813h0lksvGyCCWLRGNvdbr7+9r3M5WexQHqmf1J:FXPQAadl/K8vP1xWks+yCCWLkNFHOnW
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 76494ab107a120c14034b609a4066ebe_JaffaCakes118
Files
-
76494ab107a120c14034b609a4066ebe_JaffaCakes118.exe windows:5 windows x86 arch:x86
100053701f8cbb1a8403ac92d6ed17f4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
ExitProcess
HeapReAlloc
RtlUnwind
RaiseException
HeapSize
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetFileType
GetStartupInfoA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetTimeZoneInformation
HeapCreate
VirtualFree
VirtualAlloc
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
GetConsoleCP
GetConsoleMode
GetProcessHeap
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
CompareStringA
InterlockedExchange
GlobalFindAtomW
GlobalDeleteAtom
LoadLibraryA
GetVersionExA
GetModuleHandleA
GetCurrentProcess
SetEndOfFile
FlushFileBuffers
SetFilePointer
LoadLibraryW
GlobalAddAtomW
GetCurrentThreadId
GlobalFlags
lstrcmpW
CompareStringW
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
FreeLibrary
InterlockedDecrement
GetModuleFileNameW
GetModuleHandleW
GetProcAddress
lstrlenA
lstrcmpA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
GetLastError
SetLastError
lstrlenW
WideCharToMultiByte
Sleep
ReadFile
TransactNamedPipe
WriteFile
CreateFileA
GetFullPathNameW
CloseHandle
GetStdHandle
LockResource
MultiByteToWideChar
SizeofResource
LoadResource
FindResourceW
user32
GetClientRect
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
DefWindowProcW
CallWindowProcW
CopyRect
GetMenu
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetWindowsHookExW
CallNextHookEx
DispatchMessageW
GetKeyState
PeekMessageW
ValidateRect
SetWindowPos
SetForegroundWindow
GetDlgItem
GetFocus
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
SetWindowTextW
LoadCursorW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
SendMessageW
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxW
GetWindowTextW
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
SetMenu
IsWindow
DestroyMenu
PostQuitMessage
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
ModifyMenuW
EnableMenuItem
CheckMenuItem
RegisterWindowMessageW
LoadIconW
WinHelpW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
SetWindowLongW
MapWindowPoints
gdi32
PtVisible
RectVisible
TextOutW
ExtTextOutW
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
DeleteDC
CreateBitmap
GetStockObject
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
DeleteObject
GetDeviceCaps
winspool.drv
ClosePrinter
DocumentPropertiesW
OpenPrinterW
oleaut32
VariantChangeType
VariantClear
VariantInit
rpcrt4
RpcBindingFromStringBindingW
RpcBindingFree
RpcStringFreeW
NdrClientCall2
RpcMgmtInqIfIds
UuidToStringA
RpcBindingToStringBindingA
RpcStringBindingParseA
RpcStringBindingComposeA
RpcBindingFromStringBindingA
RpcStringFreeA
RpcMgmtEpEltInqBegin
RpcMgmtEpEltInqNextA
RpcIfIdVectorFree
RpcStringBindingComposeW
ws2_32
gethostbyname
connect
inet_addr
recv
send
recvfrom
htonl
htons
bind
socket
closesocket
gethostname
inet_ntoa
WSAStartup
WSACleanup
mpr
WNetAddConnection2A
Sections
.text Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ