Behavioral task
behavioral1
Sample
98e86e243648eeeeaeed827a2bf25076_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
98e86e243648eeeeaeed827a2bf25076_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
98e86e243648eeeeaeed827a2bf25076_JaffaCakes118
-
Size
92KB
-
MD5
98e86e243648eeeeaeed827a2bf25076
-
SHA1
b4f346140f817195e0685520368d0ec3e2cfed49
-
SHA256
0a33f77ae808e7c63ca69da7a03f8a6bbb1dd14081f3e9aa161fb3dc2257c59e
-
SHA512
4358db09b84b640aafe1992beb04f7632a88f33f5c89144ac6921b711e1fb9e14dc56fab6b3a2939a820e926c6db0e65697404a285bf35634eb66cf0f7d67474
-
SSDEEP
1536:v9SEmt1mADaUvwjkivyEs7TaAmeB2MBOCLOE5ephMV14y3aa0oIRaHc6n:v98LxmUKFs/Nm01GQOMV133axow+Tn
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.1.5:4444
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98e86e243648eeeeaeed827a2bf25076_JaffaCakes118
Files
-
98e86e243648eeeeaeed827a2bf25076_JaffaCakes118.exe windows:4 windows x86 arch:x86
d1c393fa6d32059b12042942bba53193
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegSetValueExA
kernel32
CreateFileA
GetLastError
lstrcpynA
lstrcmpA
lstrcpyA
Sleep
GetCurrentDirectoryA
GetCurrentThreadId
SetEvent
WaitForSingleObject
LocalFree
FormatMessageA
GlobalUnlock
GlobalLock
GlobalAlloc
GetTickCount
GetSystemTime
SetFilePointer
lstrcmpiA
ReadFile
WriteFile
SetThreadPriority
ReleaseSemaphore
CreateSemaphoreA
CreateEventA
TerminateThread
DeleteFileA
FindClose
FindNextFileA
GetDateFormatA
FileTimeToLocalFileTime
FileTimeToSystemTime
FindFirstFileA
GetLocalTime
SetCurrentDirectoryA
ReleaseMutex
GetModuleFileNameA
GetModuleHandleA
CreateMutexA
SetLastError
GetDriveTypeA
LoadLibraryA
GetProcAddress
GetFileSize
SetEnvironmentVariableA
GetOEMCP
GetACP
CompareStringW
CompareStringA
GetCPInfo
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
LCMapStringW
LCMapStringA
WideCharToMultiByte
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
RtlUnwind
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsGetValue
TlsAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
InterlockedIncrement
GetFullPathNameA
InterlockedDecrement
ExitThread
TlsSetValue
CreateThread
ResumeThread
HeapFree
GetTimeZoneInformation
HeapAlloc
HeapReAlloc
lstrlenA
CloseHandle
user32
wsprintfA
GetDlgItemTextA
MessageBoxA
PostMessageA
GetDlgItemInt
GetParent
SetDlgItemInt
SetDlgItemTextA
DefWindowProcA
SetTimer
KillTimer
SendMessageA
SetWindowPos
SystemParametersInfoA
GetWindowRect
IsWindowVisible
UnhookWindowsHookEx
SetWindowsHookExA
GetWindowLongA
wvsprintfA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetDlgItem
MessageBeep
GetDialogBaseUnits
SetWindowTextA
GetDC
ReleaseDC
GetClassInfoA
RegisterClassA
CreateWindowExA
DialogBoxParamA
GetClientRect
GetTopWindow
MapDialogRect
MoveWindow
FindWindowA
UnregisterClassA
GetWindow
DestroyIcon
LoadIconA
SetClassLongA
GetSystemMenu
AppendMenuA
CheckMenuItem
WinHelpA
SetWindowLongA
GetSystemMetrics
GetCursorPos
TrackPopupMenu
SetForegroundWindow
CreateDialogParamA
EnableWindow
SendDlgItemMessageA
EndDialog
DestroyWindow
GetWindowTextA
ShowWindow
InvalidateRect
gdi32
GetTextExtentPoint32A
LPtoDP
shell32
SHBrowseForFolderA
Shell_NotifyIconA
SHGetPathFromIDListA
wsock32
WSACleanup
WSAStartup
WSAAsyncGetHostByName
WSAIsBlocking
WSACancelBlockingCall
connect
send
ntohs
recv
WSAAsyncSelect
getservbyname
WSAGetLastError
WSASetLastError
select
closesocket
recvfrom
sendto
socket
setsockopt
bind
htons
htonl
ntohl
gethostname
gethostbyname
inet_addr
ioctlsocket
Sections
.text Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ