Behavioral task
behavioral1
Sample
ed97608134c05aed93c1832dcfeaf649_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed97608134c05aed93c1832dcfeaf649_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
ed97608134c05aed93c1832dcfeaf649_JaffaCakes118
-
Size
36KB
-
MD5
ed97608134c05aed93c1832dcfeaf649
-
SHA1
0b22be5962ff7f7754c8aa51b57185b159036533
-
SHA256
6adcde232b8c6502349a42d6f65125a51aacce22b17e090f7bc83998e5f0308a
-
SHA512
f16696193e4248df577a86d53b46b70509da89597c74a5eedacc7e78beef1757fb87eba446b7dd9748220f0d04399c91782e624a718d39bb058aa28569e643d4
-
SSDEEP
768:4AbtGpCnWcA/ccD9/IpPEpuRQJo7uKKeG:bfA/ccD9/IKpoTB
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ed97608134c05aed93c1832dcfeaf649_JaffaCakes118
Files
-
ed97608134c05aed93c1832dcfeaf649_JaffaCakes118.exe windows:4 windows x86 arch:x86
e3c578d0cb9451173469c21f9b8572c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TransactNamedPipe
CreateFileA
LCMapStringW
LCMapStringA
SetStdHandle
FlushFileBuffers
LoadLibraryA
GetProcAddress
GetOEMCP
GetACP
GetCPInfo
HeapFree
HeapAlloc
ExitProcess
TerminateProcess
GetCurrentProcess
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
RtlUnwind
WriteFile
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLastError
SetFilePointer
CloseHandle
mpr
WNetAddConnection2A
rpcrt4
UuidToStringA
UuidFromStringA
ws2_32
inet_addr
WSAStartup
htons
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE