Behavioral task
behavioral1
Sample
537b65309e47ab37a86576365cdf2b07_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
537b65309e47ab37a86576365cdf2b07_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
537b65309e47ab37a86576365cdf2b07_JaffaCakes118
-
Size
2.5MB
-
MD5
537b65309e47ab37a86576365cdf2b07
-
SHA1
b66ab7fe69b6ef11b910e78e65d24b4d60e5046a
-
SHA256
b569a37b3851cd980070c5f5b631ad0a566ee7408c2e5fb9cc478334aed3c92a
-
SHA512
71986973a0e7d74641bfcfb1a5ad8b1b79c7a27c334aae3e81ef4320fc16f2ccca0d1237dce1fe2e632dfef39ab177cf7dfb1675a85be9e86d6966e8acf76dd4
-
SSDEEP
6144:HUyheSTNunrKmW03oCsStpwH/gnmEvOL4IWaeM7xYWUaanF/tmWXmB43TJO:thgnlssK/9NL1s1uWk43T
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 537b65309e47ab37a86576365cdf2b07_JaffaCakes118
Files
-
537b65309e47ab37a86576365cdf2b07_JaffaCakes118.exe windows:4 windows x86 arch:x86
62c28516ebfae45fbe7403fd12451c72
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
FreeLibrary
LocalFree
MapViewOfFile
CloseHandle
UnmapViewOfFile
GetCurrentProcess
GetVersionExA
TerminateThread
TransactNamedPipe
CreateFileA
DeleteFileA
CopyFileA
SetFileAttributesA
GetFileAttributesA
GetModuleHandleA
WideCharToMultiByte
WriteFile
WaitForSingleObject
CreateEventA
ReadFile
lstrlenA
CreateDirectoryA
lstrcatA
GetDriveTypeA
GetLogicalDriveStringsA
GetComputerNameA
Module32Next
Module32First
CreateToolhelp32Snapshot
GetCurrentProcessId
IsDebuggerPresent
lstrcpyA
GetTempPathA
SetFilePointer
GetFileSize
MoveFileA
CreateFileMappingA
EnterCriticalSection
QueryPerformanceCounter
ExitProcess
CreateProcessA
ReleaseMutex
CreateMutexA
GetDiskFreeSpaceExA
GlobalMemoryStatusEx
GetTimeFormatA
GetDateFormatA
GetSystemDirectoryA
GetLocaleInfoA
lstrcmpA
GetExitCodeProcess
PeekNamedPipe
DuplicateHandle
CreatePipe
ReadProcessMemory
OpenProcess
TerminateProcess
Process32Next
Process32First
GetCurrentThread
LocalAlloc
lstrcpynA
SetFileTime
GetFileTime
GetWindowsDirectoryA
GetLocalTime
FindClose
FindNextFileA
FindFirstFileA
RemoveDirectoryA
TlsAlloc
GetCurrentThreadId
InitializeCriticalSection
IsBadWritePtr
HeapReAlloc
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetLastError
ExitThread
lstrcmpiA
GetModuleFileNameA
CreateThread
MultiByteToWideChar
Sleep
QueryPerformanceFrequency
GetTickCount
VirtualAlloc
VirtualFree
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
FlushFileBuffers
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetOEMCP
GetACP
GetCPInfo
SetStdHandle
SetUnhandledExceptionFilter
LCMapStringW
LCMapStringA
UnhandledExceptionFilter
GetFileType
GetStdHandle
HeapCreate
HeapDestroy
SetHandleCount
HeapSize
TlsGetValue
SetLastError
HeapAlloc
HeapFree
RtlUnwind
GetTimeZoneInformation
GetSystemTime
InterlockedDecrement
InterlockedIncrement
ResumeThread
TlsSetValue
RaiseException
GetStartupInfoA
GetCommandLineA
GetVersion
GetEnvironmentVariableA
user32
IsCharAlphaNumericA
CharLowerA
GetClassNameA
SendMessageA
wsprintfA
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
GetUserNameA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
RegQueryValueExA
shell32
ShellExecuteA
SHGetSpecialFolderPathA
ws2_32
shutdown
setsockopt
ioctlsocket
sendto
bind
getsockname
listen
gethostbyname
ntohs
WSACleanup
select
accept
WSAStartup
inet_addr
htons
WSASocketA
connect
send
recv
closesocket
socket
WSAGetLastError
gethostname
htonl
getsockopt
__WSAFDIsSet
ntohl
mpr
WNetAddConnection2A
iphlpapi
GetUdpTable
userenv
GetUserProfileDirectoryA
oleaut32
GetErrorInfo
Sections
.text Size: 2.5MB - Virtual size: 2.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE