Behavioral task
behavioral1
Sample
044d43a3f1aeb7d22092969bc2b304c9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
044d43a3f1aeb7d22092969bc2b304c9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
044d43a3f1aeb7d22092969bc2b304c9_JaffaCakes118
-
Size
4KB
-
MD5
044d43a3f1aeb7d22092969bc2b304c9
-
SHA1
73def81565bc50067ccda1a96c8d9ed659e6ddb2
-
SHA256
af0541657a503ab463300627f97c16b743cda1778673520d7e20e3b0b5338080
-
SHA512
c84a7e1273b343ed9481f6711d81283236c925786f996ff00c271070da6fb53d2b9d5f7fb97361b48ba3741309c6c2bf5e0ec262ffbe026b5d4c39df35c27c1c
-
SSDEEP
48:8AioSmJTEFMpRsTQEoVKO1bwlp+ttaQITuIHOP/3NMoKmJsWArBTy3HGJ7YdO72G:h2uTEivsTjeb0IRXhKNWUBTkHXTZDm3
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
140.197.212.160:5555
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 044d43a3f1aeb7d22092969bc2b304c9_JaffaCakes118
Files
-
044d43a3f1aeb7d22092969bc2b304c9_JaffaCakes118.exe windows:4 windows x86 arch:x86
f9ade0aa18f660a34a4fa23392e21838
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ExitProcess
Sections
.text Size: 512B - Virtual size: 40B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE