Behavioral task
behavioral1
Sample
a74a1519011d08c8a3524144765e3fe0_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a74a1519011d08c8a3524144765e3fe0_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a74a1519011d08c8a3524144765e3fe0_JaffaCakes118
-
Size
323KB
-
MD5
a74a1519011d08c8a3524144765e3fe0
-
SHA1
30354936612ed44c6e8e1b08eea8e225cab06616
-
SHA256
ac357c437fb811fd26c500fd7b22629ab089c45e130b2870195cfa633de1d167
-
SHA512
4eba836c1b9803ceea4d01c09cd057f58c3b9b368187c4a2f7f278bd6bebc5d13bc7d8ffd9c0b7a12ea56f5a4021a3f2962cd6f1ebd7fd0b729f18c1763d9694
-
SSDEEP
1536:7idi4xZsarhAGo7+7T/ziPxjoBXDK+HHnnq:m8OCU6FoBXdHnnq
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a74a1519011d08c8a3524144765e3fe0_JaffaCakes118
Files
-
a74a1519011d08c8a3524144765e3fe0_JaffaCakes118.exe windows:4 windows x86 arch:x86
82a98ab565d0175ecbf4ac37f192e688
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoCreateInstance
CoInitialize
CoUninitialize
kernel32
ExitThread
CloseHandle
TransactNamedPipe
CreateFileA
GetLocaleInfoA
CreateThread
Sleep
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetTickCount
ExitProcess
GetTempPathA
WaitForSingleObject
lstrcmpiA
CreateProcessA
WriteFile
ExpandEnvironmentStringsA
GetModuleFileNameA
GetStartupInfoA
GetProcAddress
LoadLibraryA
ReleaseMutex
CreateMutexA
GetVersionExA
QueryPerformanceFrequency
QueryPerformanceCounter
TerminateThread
CopyFileA
lstrlenA
SetFileAttributesA
CreateDirectoryA
lstrcatA
GetDriveTypeA
GetLogicalDriveStringsA
GetFileAttributesA
GetWindowsDirectoryA
GetCurrentProcessId
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
OpenProcess
GetModuleHandleA
msvcrt
memset
sscanf
strstr
rand
strncpy
strtok
strcmp
memcmp
free
malloc
strncat
_snprintf
strcpy
strlen
memcpy
srand
strrchr
strchr
atoi
strcat
_beginthread
printf
_vsnprintf
??2@YAPAXI@Z
_except_handler3
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
sprintf
advapi32
RegSetValueExA
RegCloseKey
RegCreateKeyExA
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 292KB - Virtual size: 312KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE