c:\netcat\Release\netcat.pdb
Behavioral task
behavioral1
Sample
f3359ab104c813efcdb3949267ee9626_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f3359ab104c813efcdb3949267ee9626_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f3359ab104c813efcdb3949267ee9626_JaffaCakes118
-
Size
60KB
-
MD5
f3359ab104c813efcdb3949267ee9626
-
SHA1
c89e47f001c392a1ed75eeb126567dcf51fc7a17
-
SHA256
1a0a62d44be682f8f6036291868ab04f5a11a60f5e5284d4b96fd2f947760482
-
SHA512
cbd145556c1968f9dd35cd88af2ed444a1f250502f1b683a89b85bb3810ad8bbaeabf5959d8d4fccf8f1e0c9a7b6c59c24ca5555fab47b67074c637d6b12f4af
-
SSDEEP
1536:iBtQqmmkgGg7TjTK/h8DHZto58slDUADGRMlu:iBGqmkGgv3K/h8DHZc8+UZMlu
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.170.0.120:4444
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f3359ab104c813efcdb3949267ee9626_JaffaCakes118
Files
-
f3359ab104c813efcdb3949267ee9626_JaffaCakes118.exe windows:4 windows x86 arch:x86
b47060fbcbd9d8ec9716eb4a0fdbc38f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
ws2_32
__WSAFDIsSet
select
listen
getsockname
recvfrom
accept
WSASetLastError
socket
setsockopt
bind
connect
htons
getservbyport
ntohs
getservbyname
inet_addr
gethostbyname
inet_ntoa
gethostbyaddr
WSAGetLastError
WSAStartup
WSACleanup
shutdown
closesocket
recv
send
kernel32
GetSystemTimeAsFileTime
CreateFileA
GetNumberOfConsoleInputEvents
PeekConsoleInputA
LCMapStringW
LCMapStringA
GetSystemInfo
VirtualProtect
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapSize
SetStdHandle
SetFilePointer
SetEnvironmentVariableA
GetOEMCP
GetACP
CompareStringW
GetCPInfo
MultiByteToWideChar
CompareStringA
VirtualQuery
InterlockedExchange
GetLastError
CloseHandle
CreateProcessA
DuplicateHandle
GetCurrentProcess
ExitThread
Sleep
ReadFile
PeekNamedPipe
WriteFile
CreatePipe
DisconnectNamedPipe
TerminateProcess
WaitForMultipleObjects
TerminateThread
CreateThread
GetStdHandle
FreeConsole
ExitProcess
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleA
SetEndOfFile
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetModuleFileNameA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
WideCharToMultiByte
SetHandleCount
GetFileType
GetStartupInfoA
FlushFileBuffers
RtlUnwind
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
LoadLibraryA
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE