Behavioral task
behavioral1
Sample
f1137596260f0276b91aa372591d7d55_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f1137596260f0276b91aa372591d7d55_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f1137596260f0276b91aa372591d7d55_JaffaCakes118
-
Size
84KB
-
MD5
f1137596260f0276b91aa372591d7d55
-
SHA1
0b2161910506b407a0cec13237da7b27d778ee74
-
SHA256
51af4d64a7807ab8e855027b8f8a816e56a6a69fd0fb75a4961805cdd07c5aad
-
SHA512
4b6dbf33fd95a195038bb7d2aec39d7fe32c49dc46417b64c575dddde56e4d049e96634fadd689efb4e78aea007820553e2a8489cccb2fd9ac026453391973b7
-
SSDEEP
1536:s+dCpQcP1tfKt2yJUHF/ZjxsuXlJaQfPhr6XuVDSaA5scDsrR2:s+CN9tuNgNZ1sOlJf+CSaFF2
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.22.128:31337
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f1137596260f0276b91aa372591d7d55_JaffaCakes118
Files
-
f1137596260f0276b91aa372591d7d55_JaffaCakes118.exe windows:4 windows x86 arch:x86
aae33ab4a310f18dc58a55b2fb1857a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetAddConnection2A
WNetCancelConnection2A
kernel32
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
GetStdHandle
Sleep
GetTimeFormatA
GetDateFormatA
FileTimeToSystemTime
IsBadStringPtrA
GetSystemTimeAsFileTime
SetConsoleCursorPosition
SetConsoleCtrlHandler
SetPriorityClass
GetCurrentProcess
GetComputerNameA
GetConsoleMode
lstrlenA
CreateFileA
FileTimeToLocalFileTime
LCMapStringA
InterlockedDecrement
InterlockedIncrement
GetLastError
WideCharToMultiByte
RtlUnwind
HeapFree
ExitProcess
TerminateProcess
HeapAlloc
ResumeThread
CreateThread
TlsSetValue
ExitThread
CloseHandle
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringW
GetCurrentThreadId
TlsAlloc
SetLastError
TlsGetValue
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
FlushFileBuffers
WriteFile
SetHandleCount
GetFileType
GetStartupInfoA
GetProcAddress
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetFilePointer
SetStdHandle
LoadLibraryA
ReadConsoleInputA
SetConsoleMode
user32
wsprintfA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegConnectRegistryA
Sections
.text Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ