Behavioral task
behavioral1
Sample
d67e4277f54a2812b6fefd20f883827a_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d67e4277f54a2812b6fefd20f883827a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d67e4277f54a2812b6fefd20f883827a_JaffaCakes118
-
Size
144KB
-
MD5
d67e4277f54a2812b6fefd20f883827a
-
SHA1
5e786e9b9cf89e8c117dcb558b4e05ad93945f7b
-
SHA256
dc0982c0cd86056b8810f8636a79e6c473cba70f56902e805a17fd10ef0bc712
-
SHA512
93e12bbdf3f8ca82d0ef649b0851ac1ac8557a5f85c3afe8ed1311f551e8847a4af7aed47b15f95a3c3e29b770f4eb168a602220edd6e2b09944b66562a11478
-
SSDEEP
1536:dvcE7tLOK5CIozZGSgqU1qE5W6PNzJgqmLEpc8+5Wjiz+EblWvXSvGs3mByjsp5:dvhkdzwS41qmPN2h8P5ilAWu
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
72.199.171.241:81
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d67e4277f54a2812b6fefd20f883827a_JaffaCakes118
Files
-
d67e4277f54a2812b6fefd20f883827a_JaffaCakes118.exe windows:4 windows x86 arch:x86
7179aa7839425e7e9f8ae2a1dae35e33
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
comdlg32
GetOpenFileNameA
PrintDlgA
GetSaveFileNameA
gdi32
CreateFontA
GetTextExtentPoint32A
EndDoc
EndPage
DeleteObject
CreateCompatibleBitmap
DeleteDC
BitBlt
SelectObject
CreateCompatibleDC
SetTextColor
CreateHatchBrush
CreateSolidBrush
CreatePen
IntersectClipRect
SelectClipRgn
ExtTextOutW
SetBkMode
GetTextExtentPoint32W
GetTextMetricsA
CreateFontIndirectA
Rectangle
SetPixel
Polyline
Ellipse
GetStockObject
Polygon
SetMapMode
StartDocA
StartPage
GetDeviceCaps
user32
LoadIconA
CreateMenu
AppendMenuA
DestroyMenu
SetMenu
MessageBeep
TranslateMessage
BeginPaint
IntersectRect
EndPaint
PostQuitMessage
ReleaseCapture
DefWindowProcA
GetKeyboardState
EnableMenuItem
CheckMenuItem
DrawMenuBar
CheckDlgButton
DefDlgProcA
LoadCursorA
RegisterClassA
EnableWindow
ShowWindow
IsDialogMessageA
DispatchMessageA
GetMessageA
SetForegroundWindow
DestroyWindow
SendMessageA
GetDlgItemTextA
IsDlgButtonChecked
SendDlgItemMessageA
GetWindowLongA
CreateWindowExA
SetWindowLongA
SystemParametersInfoA
GetClientRect
AdjustWindowRectEx
GetMenu
SetRect
GetMenuItemCount
GetMenuItemRect
UnionRect
SetWindowPos
GetWindowRect
WinHelpA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
SetTimer
KillTimer
OffsetRect
InvalidateRect
GetSysColor
GetDC
ReleaseDC
SetWindowTextA
MessageBoxA
SetCapture
kernel32
InterlockedExchange
SetEndOfFile
RtlUnwind
CreateFileA
SetStdHandle
HeapSize
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
FlushFileBuffers
SetFilePointer
GetOEMCP
GetACP
VirtualQuery
GetSystemInfo
VirtualProtect
GetCPInfo
GetLocaleInfoA
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
ReadFile
WriteFile
CloseHandle
LCMapStringW
LCMapStringA
WideCharToMultiByte
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
RaiseException
GetStringTypeW
GetStringTypeA
GetVersionExA
GetCommandLineA
GetStartupInfoA
GetCurrentProcess
TerminateProcess
GetModuleHandleA
ExitProcess
HeapReAlloc
HeapFree
HeapAlloc
MulDiv
GetModuleFileNameA
LoadLibraryA
GetProcAddress
FreeLibrary
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
LocalFree
FormatMessageA
GetLastError
GetLocalTime
MultiByteToWideChar
GetTickCount
Sections
.text Size: 84KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
cdym Size: 4KB - Virtual size:
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ