Static task
static1
Behavioral task
behavioral1
Sample
afa1f1e2431e946dabc785135bb49796_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
afa1f1e2431e946dabc785135bb49796_JaffaCakes118
-
Size
631KB
-
MD5
afa1f1e2431e946dabc785135bb49796
-
SHA1
bdc5d91a7055fe531cbc37969427db58bb954508
-
SHA256
414981248ce4add440d42b94db54d8badb3c6292531c7fc41f2a598720f61403
-
SHA512
c593f6eb4ec9c9287a72d38f8bf51abbc8520e9ac4ad92c3f8dab52126c06c2346aeac9448b5b3d1914cd1694145db8400568ff2e071ea71286e2743c7bd25ab
-
SSDEEP
12288:eE5TvcnBI9m5Xq+geZ7KM7XYrveJ/8kprLT3hYOeSOm+:eqcBI9m5IeNr7XYrWJZ/32OeSOt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource afa1f1e2431e946dabc785135bb49796_JaffaCakes118
Files
-
afa1f1e2431e946dabc785135bb49796_JaffaCakes118.exe windows:5 windows x86 arch:x86
b6a7c485522de8c9d0c32135d53a8237
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommMask
FreeLibrary
LoadLibraryA
CompareStringA
InterlockedExchange
GetModuleHandleA
SetLastError
SetEnvironmentVariableA
HeapSize
GetTimeZoneInformation
GetCurrentThread
IsValidLocale
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
HeapReAlloc
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetProcessHeap
RaiseException
SetConsoleCtrlHandler
WriteFile
SetSystemTimeAdjustment
GetPriorityClass
GetNamedPipeInfo
SetTimeZoneInformation
GetEnvironmentStrings
TlsSetValue
SetCommTimeouts
PurgeComm
GetCompressedFileSizeW
GetUserDefaultLCID
DeviceIoControl
GetTickCount
TlsFree
TlsGetValue
TlsAlloc
TerminateProcess
Sleep
InitializeCriticalSectionAndSpinCount
GetLastError
MoveFileExW
CloseHandle
DuplicateHandle
GetCurrentProcess
CreateProcessA
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetFullPathNameA
GetCommandLineW
IsDebuggerPresent
IsProcessorFeaturePresent
GetCurrentThreadId
RtlUnwind
SetFilePointerEx
GetStdHandle
GetFileType
DeleteCriticalSection
GetACP
GetOEMCP
HeapAlloc
HeapFree
GetCurrentProcessId
FatalAppExitA
WaitForSingleObject
GetExitCodeProcess
CreatePipe
UnhandledExceptionFilter
SetUnhandledExceptionFilter
ReadFile
user32
AdjustWindowRectEx
DdeQueryNextServer
RegisterWindowMessageA
UnhookWindowsHook
UnloadKeyboardLayout
IMPGetIMEA
CloseClipboard
PtInRect
GetMenuItemRect
LockWindowUpdate
GetKeyboardState
winspool.drv
StartDocDlgA
ord214
ord204
comdlg32
FindTextA
ChooseColorA
advapi32
SetKernelObjectSecurity
SystemFunction020
SystemFunction033
SystemFunction029
LookupPrivilegeDisplayNameA
LsaFreeMemory
LsaSetTrustedDomainInformation
ole32
HWND_UserMarshal
OleConvertIStorageToOLESTREAMEx
StringFromGUID2
OleCreateFromDataEx
HPALETTE_UserFree
HACCEL_UserMarshal
Sections
.text Size: 197KB - Virtual size: 197KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 328KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ