notepad.pdb
Behavioral task
behavioral1
Sample
272669a716cbae9f0aeaf85091836701_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
272669a716cbae9f0aeaf85091836701_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
272669a716cbae9f0aeaf85091836701_JaffaCakes118
-
Size
191KB
-
MD5
272669a716cbae9f0aeaf85091836701
-
SHA1
b66ab369709ec8d2367874677e8c33d3335aab7f
-
SHA256
0c2357df806ccf5163685ecc3815c25428d90408750f16c82dc5e8d181e74b5d
-
SHA512
5965a4ebad937af847bf986aa485b62f037e42cc45f88b995fbf3505550269d9103060b2b2f8529c1fd1e78437668bb3e44348cab9c565e29fb98605986ba203
-
SSDEEP
3072:sVexzTMlI0frxJLgf7nDVF6PUp1Yo3ICgxgVfHH:sExJex5gfzDVlVXgaV
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
encoder/call4_dword_xor
Extracted
metasploit
windows/shell_reverse_tcp
192.168.1.81:445
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 272669a716cbae9f0aeaf85091836701_JaffaCakes118
Files
-
272669a716cbae9f0aeaf85091836701_JaffaCakes118.exe windows:6 windows x86 arch:x86
2a141685bec588fb7b12c50a8a40eb2b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
advapi32
RegSetValueExW
RegQueryValueExW
RegCloseKey
RegCreateKeyW
RegOpenKeyExW
IsTextUnicode
CloseServiceHandle
QueryServiceConfigW
OpenServiceW
OpenSCManagerW
kernel32
FindNLSString
GlobalAlloc
GlobalUnlock
GlobalLock
GetTimeFormatW
GetDateFormatW
GetLocalTime
GetUserDefaultUILanguage
HeapFree
HeapAlloc
GetProcessHeap
GetFileInformationByHandle
InterlockedExchange
FreeLibraryAndExitThread
GetFileAttributesW
Wow64RevertWow64FsRedirection
Wow64DisableWow64FsRedirection
IsWow64Process
GetCurrentProcess
CreateThread
LoadLibraryW
GetModuleFileNameW
CreateFileMappingW
FormatMessageW
MapViewOfFile
MultiByteToWideChar
UnmapViewOfFile
LocalReAlloc
GetACP
DeleteFileW
SetEndOfFile
WideCharToMultiByte
SetLastError
WriteFile
GetLastError
LocalSize
GetFullPathNameW
MulDiv
GetCommandLineW
GetCurrentProcessId
FoldStringW
lstrcmpW
FindFirstFileW
FindClose
HeapSetInformation
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
GetStartupInfoA
InterlockedCompareExchange
Sleep
LocalLock
LocalUnlock
lstrlenW
GetLocaleInfoW
GlobalFree
lstrcmpiW
SetErrorMode
CreateFileW
ReadFile
CloseHandle
LocalAlloc
InterlockedDecrement
LocalFree
InterlockedIncrement
GetVersionExW
UnhandledExceptionFilter
gdi32
CreateFontIndirectW
SetMapMode
SetViewportExtEx
SetWindowExtEx
LPtoDP
SetBkMode
GetTextMetricsW
SetAbortProc
StartDocW
StartPage
EndPage
AbortDoc
EndDoc
DeleteDC
TextOutW
GetTextExtentPoint32W
CreateDCW
SelectObject
GetTextFaceW
EnumFontsW
GetDeviceCaps
DeleteObject
user32
SetActiveWindow
GetKeyboardLayout
PostQuitMessage
DefWindowProcW
GetForegroundWindow
IsIconic
DestroyWindow
MessageBeep
GetWindowPlacement
CharUpperW
RegisterClassExW
LoadImageW
LoadCursorW
SetWindowLongW
LoadAcceleratorsW
GetSystemMenu
SetWindowPlacement
CreateWindowExW
RegisterWindowMessageW
UpdateWindow
InvalidateRect
SetScrollPos
GetWindowTextLengthW
GetWindowLongW
PeekMessageW
EnableWindow
DialogBoxParamW
CreateDialogParamW
GetWindowTextW
SetWindowPos
SetCursor
SetForegroundWindow
FindWindowW
GetSystemMetrics
MoveWindow
SendMessageW
CharNextW
CheckMenuItem
CloseClipboard
IsClipboardFormatAvailable
OpenClipboard
GetMenuState
EnableMenuItem
GetSubMenu
GetClientRect
UnhookWinEvent
GetFocus
GetMenu
MessageBoxW
WinHelpW
GetDlgCtrlID
ChildWindowFromPoint
GetDC
ShowWindow
DrawTextExW
ReleaseDC
LoadIconW
SetWinEventHook
GetMessageW
PostMessageW
IsDialogMessageW
TranslateAcceleratorW
EndDialog
GetDlgItemTextW
SetDlgItemTextW
SetFocus
SetWindowTextW
GetParent
LoadStringW
SendDlgItemMessageW
GetCursorPos
ScreenToClient
TranslateMessage
GetAncestor
DispatchMessageW
msvcrt
_controlfp
_vsnwprintf
memset
_wtol
memcpy
iswctype
wcsncmp
wcsrchr
_except_handler4_common
__p__fmode
__p__commode
__setusermatherr
_amsg_exit
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
__getmainargs
_cexit
_exit
?terminate@@YAXXZ
__set_app_type
comdlg32
ReplaceTextW
PageSetupDlgW
PrintDlgExW
FindTextW
ChooseFontW
GetSaveFileNameW
CommDlgExtendedError
GetOpenFileNameW
GetFileTitleW
shell32
DragAcceptFiles
SHAddToRecentDocs
SHGetFolderPathW
SHCreateItemFromParsingName
ShellExecuteExW
DragQueryFileW
DragFinish
ShellAboutW
winspool.drv
OpenPrinterW
ClosePrinter
GetPrinterDriverW
ole32
CoInitializeEx
CoUninitialize
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
CoInitialize
shlwapi
PathIsFileSpecW
SHStrDupW
comctl32
CreatePropertySheetPageW
PropertySheetW
CreateStatusWindowW
ord345
oleaut32
SysFreeString
SysAllocString
ntdll
WinSqmIncrementDWORD
RtlInitUnicodeString
NtQueryLicenseValue
WinSqmAddToStream
version
GetFileVersionInfoExW
GetFileVersionInfoSizeExW
VerQueryValueW
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
fwGS Size: 16KB - Virtual size:
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ