Behavioral task
behavioral1
Sample
0841986aaf11274cc3423d8c7cfe7abd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0841986aaf11274cc3423d8c7cfe7abd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0841986aaf11274cc3423d8c7cfe7abd_JaffaCakes118
-
Size
60KB
-
MD5
0841986aaf11274cc3423d8c7cfe7abd
-
SHA1
dfb22bbb5eec4a4c4aa8c6908c8d629dfc7bce4c
-
SHA256
b5c1b308f0634437fa43d70bda9dcc3582d5810fff398c83bf7d21e4ff50920e
-
SHA512
8594fbcb363e67fae864b212e6110306090f32e96a926b74d28ccb4f80af315c93c7bfd99326ee4d9d8cfd44266c9f3b96ea86c6439826cbe1d41354c4dd5253
-
SSDEEP
768:SjdolU1i8nHcaPxxqdrQD9yN8HkmTIOrnToIf1ZU+PxnC1w6udvE1:em8H/pxqkhM8lIOrnToIffTd0
Malware Config
Extracted
metasploit
windows/exec
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0841986aaf11274cc3423d8c7cfe7abd_JaffaCakes118
Files
-
0841986aaf11274cc3423d8c7cfe7abd_JaffaCakes118.exe windows:4 windows x86 arch:x86
63bc027337968506d190fc50d723bc57
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
CreatePropertySheetPageA
PropertySheetA
kernel32
DeleteFileA
GetPrivateProfileIntA
GetPrivateProfileStringA
ResumeThread
SetPriorityClass
GetCurrentProcess
GetCurrentThread
SetThreadPriority
CreateProcessA
GetModuleFileNameA
RemoveDirectoryA
GetFileSize
GetModuleHandleA
GetTempPathA
CreateDirectoryA
GetFileAttributesA
MapViewOfFile
CreateFileMappingA
CloseHandle
SetFileTime
GetStartupInfoA
DosDateTimeToFileTime
GetLastError
CreateFileA
FreeLibrary
SetLastError
FormatMessageA
LocalFree
MultiByteToWideChar
LoadLibraryA
GetProcAddress
lstrlenA
GetTempFileNameA
UnmapViewOfFile
user32
MoveWindow
GetFocus
SendMessageA
RegisterClassA
CreateWindowExA
ShowWindow
UpdateWindow
LoadCursorA
SetCursor
PeekMessageA
TranslateMessage
DispatchMessageA
GetDlgItem
GetWindowRect
MessageBoxA
GetDC
ReleaseDC
SendDlgItemMessageA
GetParent
wsprintfA
SetDlgItemTextA
PostMessageA
DefWindowProcA
BeginPaint
GetSystemMetrics
EndPaint
gdi32
DeleteObject
TextOutA
SetBkMode
SelectObject
CreateFontA
CreateDIBitmap
CreateSolidBrush
SetTextColor
advapi32
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegEnumKeyExA
RegQueryValueA
RegCloseKey
ole32
CoCreateInstance
CoUninitialize
CoInitialize
msvcr71
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_amsg_exit
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
_controlfp
_strnicmp
_strcmpi
_strdup
_tempnam
_close
_read
_except_handler3
__p___argc
__p___argv
_open
strncmp
strchr
memcpy
memset
strncat
strcat
strlen
strcpy
strcmp
strrchr
fprintf
_vsnprintf
malloc
_snprintf
strncpy
free
sscanf
_putenv
remove
fread
ftell
fseek
fopen
fclose
fflush
_iob
freopen
fwrite
strftime
localtime
time
sprintf
_fstat
strtol
_pctype
_isctype
__mb_cur_max
qsort
realloc
fgets
Sections
.text Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ