Static task
static1
Behavioral task
behavioral1
Sample
fc9bb08703623f16b3b6fd654ab14b4a_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fc9bb08703623f16b3b6fd654ab14b4a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fc9bb08703623f16b3b6fd654ab14b4a_JaffaCakes118
-
Size
415KB
-
MD5
fc9bb08703623f16b3b6fd654ab14b4a
-
SHA1
6031a2a5e8be0d2004f4422a6bf88ad11909c75b
-
SHA256
9bdcb8eed0ddc7b700e3ac1ded641d2f5f703ea3cdfedc5eaad228f01cbb94d6
-
SHA512
1e8f898f97d5515fd267578eddb3ec6ea9f5725be54b9bac7bf2ebc42d16428c2d81c86972e0769ba92324b20c3fb977c53d47ee5aab8c5c3f321c25fa28ba58
-
SSDEEP
12288:WWAQN6SlDqx/YBUY7kpgr8GHlSoF+IsGq:WvrSlE/Yq9roF+PH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource fc9bb08703623f16b3b6fd654ab14b4a_JaffaCakes118
Files
-
fc9bb08703623f16b3b6fd654ab14b4a_JaffaCakes118.exe windows:6 windows x86 arch:x86
53c59b75f4f7c3e4cf3b5a4fc5238353
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateDirectoryW
CreateFileW
DeleteFileW
FileTimeToLocalFileTime
FindClose
FindFirstFileW
FindNextFileW
GetDiskFreeSpaceExW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
GetShortPathNameW
GetTempFileNameW
GetVolumeInformationW
ReadFile
RemoveDirectoryW
SetFileAttributesW
SetFilePointer
SetFilePointerEx
WriteFile
GetTempPathW
CloseHandle
DuplicateHandle
GetLastError
SetLastError
HeapReAlloc
GetProcessHeap
WaitForSingleObject
GetCurrentProcess
ExitProcess
GetExitCodeProcess
CreateProcessW
GetStartupInfoW
GetLocalTime
GetSystemDirectoryW
GetWindowsDirectoryW
GetModuleHandleW
GetProcAddress
LocalAlloc
LocalFree
SearchPathW
lstrcmpW
lstrcmpiW
lstrcpynW
lstrcpyW
lstrcatW
lstrlenW
CopyFileW
MoveFileW
MoveFileExW
CreateHardLinkW
SetVolumeLabelW
FileTimeToSystemTime
CreateSymbolicLinkW
GetDateFormatW
GetTimeFormatW
CompareStringW
MultiByteToWideChar
WideCharToMultiByte
GetConsoleCP
GetConsoleOutputCP
GetConsoleMode
SetConsoleMode
ReadConsoleW
WriteConsoleW
FillConsoleOutputCharacterW
FillConsoleOutputAttribute
GetConsoleScreenBufferInfo
SetConsoleCursorPosition
SetConsoleTextAttribute
SetConsoleTitleW
FlushFileBuffers
HeapSize
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetFileType
GetCurrentDirectoryW
SetCurrentDirectoryW
ExpandEnvironmentStringsW
SetEnvironmentVariableW
GetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetStdHandle
FormatMessageW
GetStdHandle
HeapAlloc
HeapFree
GetStringTypeW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
TerminateProcess
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RaiseException
GetModuleFileNameW
GetModuleHandleExW
GetCommandLineA
LCMapStringW
DecodePointer
user32
GetDC
GrayStringA
MessageBoxA
IsCharAlphaW
CharNextExA
CharUpperBuffW
wsprintfW
LoadStringW
IsCharAlphaNumericW
advapi32
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
LookupAccountSidW
GetSecurityDescriptorOwner
GetFileSecurityW
shell32
FindExecutableW
SHFileOperationW
SHGetFileInfoW
Sections
.text Size: 147KB - Virtual size: 146KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ