c:\Documents and Settings\Xp\سطح المكتب\rx\Debug\rBot.pdb
Behavioral task
behavioral1
Sample
e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118
-
Size
377KB
-
MD5
e5d0650411b0b4c0e5989d62895a35af
-
SHA1
0307a3a8827743c27079b3db4abb541126564cd9
-
SHA256
eb168aaf39c4926770e387f1b34bda57823b6afe7a26779856bf9391573b2a37
-
SHA512
10666e2fc8739c7fc6e1d0e6b6ddf63780f8ce823d946f1d8727a126c8741fec676a233c6f12aaef2bfec64260f6aeb92418640ac924a39a1f7579bbe749dadd
-
SSDEEP
6144:reVaO/iUJ4BrbvBJfK4PVCX23mGBWuMFvYoc9dRT+GDNmMzuMs6Cyv3kgg:reVT/iUJ45bvregmZ/Fgoc9bLX643
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
Metasploit family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118
Files
-
e5d0650411b0b4c0e5989d62895a35af_JaffaCakes118.exe windows:4 windows x86 arch:x86
6e9e56118c4d9c71b3f8f3f2c55b51b1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
CloseHandle
CreateProcessA
GetModuleFileNameA
GetSystemDirectoryA
Sleep
LoadLibraryA
GetLastError
GetProcAddress
GetModuleHandleA
CreateThread
DeleteFileA
OpenProcess
GetCurrentProcessId
CopyFileA
SetFileAttributesA
GetFileAttributesA
WaitForSingleObject
CreateMutexA
GetTickCount
TerminateThread
GetTempPathA
MoveFileA
GetComputerNameA
GetLocaleInfoA
GetVersionExA
ExitThread
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
MultiByteToWideChar
ReadFile
WriteFile
TransactNamedPipe
CreateFileA
WideCharToMultiByte
TerminateProcess
DuplicateHandle
GetCurrentProcess
CreatePipe
GetTimeFormatA
GetDateFormatA
GetFileSize
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FindNextFileA
FindFirstFileA
SetFilePointer
SetConsoleCtrlHandler
WaitForMultipleObjects
GenerateConsoleCtrlEvent
GetLocalTime
QueryPerformanceCounter
QueryPerformanceFrequency
FreeLibrary
GetEnvironmentVariableW
HeapFree
HeapAlloc
GetProcessHeap
VirtualQueryEx
ReadProcessMemory
GetSystemInfo
FormatMessageA
GlobalUnlock
GlobalLock
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SetFileTime
GetFileTime
ExpandEnvironmentStringsA
lstrcmpiA
GetExitCodeProcess
PeekNamedPipe
GetLogicalDrives
GlobalMemoryStatus
CompareStringW
SetEnvironmentVariableA
CompareStringA
GetLocaleInfoW
SetEndOfFile
GetTimeZoneInformation
IsBadCodePtr
GetUserDefaultLCID
EnumSystemLocalesA
IsValidCodePage
IsValidLocale
GetStringTypeW
GetStringTypeA
InitializeCriticalSection
FlushFileBuffers
SetStdHandle
InterlockedExchange
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
DebugBreak
GetStdHandle
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
FatalAppExitA
HeapReAlloc
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
TlsAlloc
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetLastError
GetCurrentThread
GetACP
GetOEMCP
GetCPInfo
SetHandleCount
GetFileType
SetUnhandledExceptionFilter
VirtualProtect
VirtualQuery
LCMapStringA
ws2_32
WSASocketA
getsockopt
ntohs
inet_ntoa
connect
WSACleanup
setsockopt
ioctlsocket
bind
listen
accept
closesocket
htons
gethostbyname
WSAStartup
recv
socket
send
__WSAFDIsSet
inet_addr
getsockname
select
Sections
.text Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 673KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE