Static task
static1
Behavioral task
behavioral1
Sample
9d8e1173ecc6d44b69fabdfd2d9ecb15_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
9d8e1173ecc6d44b69fabdfd2d9ecb15_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
9d8e1173ecc6d44b69fabdfd2d9ecb15_JaffaCakes118
-
Size
323KB
-
MD5
9d8e1173ecc6d44b69fabdfd2d9ecb15
-
SHA1
a44f35e516f59d764226326c8eb4af6540d8a8a0
-
SHA256
781f78c1ee4bdaeb0bdcdc35380427fdfc00faee122bb4c5ff0733004a56dd04
-
SHA512
5f74ad1edb4636b7175ef022ceb71d09aa3334a1814ab85b6b9da2af947242d67a652ee5d42bd09a8755ff581ed07f306ce3240877a8dbae6ebd74872c0db5cb
-
SSDEEP
6144:TjD+U0UCpLIXn8IIbvxFU4i5Jwi//8EvZCgdmNElgtxuzUyfK:XD+U0Uq838IIbJFUV7s4kDVLu2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 9d8e1173ecc6d44b69fabdfd2d9ecb15_JaffaCakes118
Files
-
9d8e1173ecc6d44b69fabdfd2d9ecb15_JaffaCakes118.exe windows:5 windows x86 arch:x86
04e513801679cc6571b8f58fe44cc55c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapLock
GlobalAlloc
InterlockedIncrement
GetConsoleCP
GetPrivateProfileSectionW
SetEvent
TryEnterCriticalSection
LocalLock
ReadFileEx
FindActCtxSectionGuid
FindActCtxSectionStringW
GetModuleFileNameA
GetFileAttributesA
ReleaseMutex
SleepEx
WaitForSingleObject
FindResourceExW
EndUpdateResourceA
GetConsoleTitleA
FreeConsole
SetConsoleTitleA
AttachConsole
ActivateActCtx
ReadConsoleW
ZombifyActCtx
ReleaseActCtx
HeapValidate
GetProcessHeaps
LoadLibraryA
GetProcAddress
CommConfigDialogA
HeapAlloc
GetCurrentProcess
SetHandleInformation
lstrlenW
SetFileShortNameW
ReadFile
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RaiseException
RtlUnwind
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetLastError
HeapFree
TerminateProcess
IsDebuggerPresent
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetModuleHandleW
ExitProcess
WriteFile
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetStdHandle
WideCharToMultiByte
CloseHandle
CreateFileA
LCMapStringA
LCMapStringW
GetConsoleMode
FlushFileBuffers
SetEndOfFile
GetProcessHeap
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
gdi32
GetCharWidthFloatW
Sections
.text Size: 86KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 73.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hadi Size: 512B - Virtual size: 346B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tohan Size: 1024B - Virtual size: 626B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sijek Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pabax Size: 512B - Virtual size: 6B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yididom Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 45KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ