Behavioral task
behavioral1
Sample
d233624ecf510e125e21ddf5839f563f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d233624ecf510e125e21ddf5839f563f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d233624ecf510e125e21ddf5839f563f_JaffaCakes118
-
Size
116KB
-
MD5
d233624ecf510e125e21ddf5839f563f
-
SHA1
65b3e9a7d5387c2f470e55226cabcec8cecdd1b9
-
SHA256
f949aae8875a8ddaf10121719674e9e2f8c77984e25f263a2b093919a64f9be9
-
SHA512
8af7e205fa25badb04eb2de3c3fddf31bcd235f0e356836c220c9bdd8875b950f3a042f90744c8f3e4f762c12f60afcd29f1226a336ce56a00fd8147f22c9c49
-
SSDEEP
1536:QxPsUnUlCsZwCaFS7vR8TfSpq0oxE9oP90FKbzSuzVtsl:QWdUsZ4Y7vR8TMqS5uSotsl
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
120.50.32.50:50
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d233624ecf510e125e21ddf5839f563f_JaffaCakes118
Files
-
d233624ecf510e125e21ddf5839f563f_JaffaCakes118.exe windows:4 windows x86 arch:x86
496d6bb079f7bb39bb20f69e831e2485
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
opengl32
wglGetProcAddress
wglCreateContext
wglDeleteContext
glGetString
glEnable
glEnd
glVertex2f
glTexCoord2f
glBegin
glGetTexImage
glDrawBuffer
glBindTexture
glViewport
glOrtho
glLoadIdentity
glMatrixMode
glDeleteTextures
wglMakeCurrent
glGenTextures
glTexParameteri
glTexImage2D
glGetError
kernel32
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CreateFileA
SetStdHandle
GetLocaleInfoA
HeapSize
FlushFileBuffers
IsValidCodePage
GetOEMCP
GetACP
GetLastError
SetCurrentDirectoryA
GetCommandLineA
GetCurrentDirectoryA
GetTickCount
CreateEventA
OpenEventA
GetProcAddress
LoadLibraryA
FreeLibrary
GetVersionExA
QueryPerformanceCounter
GetCPInfo
GetSystemTimeAsFileTime
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetConsoleMode
GetConsoleCP
WideCharToMultiByte
SetFilePointer
MultiByteToWideChar
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
CloseHandle
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
ExitProcess
HeapFree
HeapAlloc
RaiseException
GetProcessHeap
GetStartupInfoA
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
Sleep
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetModuleFileNameA
InitializeCriticalSection
HeapDestroy
user32
GetDC
ReleaseDC
DefWindowProcA
PostQuitMessage
UnregisterClassA
DispatchMessageA
TranslateMessage
PeekMessageA
MsgWaitForMultipleObjectsEx
EnumDisplaySettingsExA
CreateWindowExA
RegisterClassExA
LoadCursorA
LoadIconA
MessageBoxA
EnumDisplayDevicesA
gdi32
ExtEscape
DeleteDC
GetStockObject
ChoosePixelFormat
SetPixelFormat
CreateDCA
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ