Behavioral task
behavioral1
Sample
a800cb0236f7e0e55bee8f53bfa7cc86_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a800cb0236f7e0e55bee8f53bfa7cc86_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a800cb0236f7e0e55bee8f53bfa7cc86_JaffaCakes118
-
Size
84KB
-
MD5
a800cb0236f7e0e55bee8f53bfa7cc86
-
SHA1
5359b202d688448fb00468facd4800d0f88ed1e4
-
SHA256
bc7efb1740cc640cf010a9960e82c54348c3089c292e70aeea1b6e6beab0e268
-
SHA512
5bd85768b32cb7bfe2d6c1af79ab7d92162f364599d51e7f6223168f4c68f34b7f565257d202dc1e86bcaa2fe17febf1bbbc158718d82aa54ede65fa918019ef
-
SSDEEP
1536:WN/Kig259b1o2IBi432HJvT0sH9PWitYd1jiASaA5scDsrR2:uKw9b1KBi43QvT0wPWiGh3SaFF2
Malware Config
Extracted
metasploit
encoder/shikata_ga_nai
Extracted
metasploit
windows/shell_reverse_tcp
192.168.206.164:777
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a800cb0236f7e0e55bee8f53bfa7cc86_JaffaCakes118
Files
-
a800cb0236f7e0e55bee8f53bfa7cc86_JaffaCakes118.exe windows:4 windows x86 arch:x86
aae33ab4a310f18dc58a55b2fb1857a0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mpr
WNetAddConnection2A
WNetCancelConnection2A
kernel32
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
GetStdHandle
Sleep
GetTimeFormatA
GetDateFormatA
FileTimeToSystemTime
IsBadStringPtrA
GetSystemTimeAsFileTime
SetConsoleCursorPosition
SetConsoleCtrlHandler
SetPriorityClass
GetCurrentProcess
GetComputerNameA
GetConsoleMode
lstrlenA
CreateFileA
FileTimeToLocalFileTime
LCMapStringA
InterlockedDecrement
InterlockedIncrement
GetLastError
WideCharToMultiByte
RtlUnwind
HeapFree
ExitProcess
TerminateProcess
HeapAlloc
ResumeThread
CreateThread
TlsSetValue
ExitThread
CloseHandle
EnterCriticalSection
LeaveCriticalSection
GetCommandLineA
GetVersion
InitializeCriticalSection
DeleteCriticalSection
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringW
GetCurrentThreadId
TlsAlloc
SetLastError
TlsGetValue
GetModuleHandleA
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
FlushFileBuffers
WriteFile
SetHandleCount
GetFileType
GetStartupInfoA
GetProcAddress
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetFilePointer
SetStdHandle
LoadLibraryA
ReadConsoleInputA
SetConsoleMode
user32
wsprintfA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegConnectRegistryA
Sections
.text Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 976B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ