Static task
static1
Behavioral task
behavioral1
Sample
29e91b631441caf7d1bb2876a5a63f110390763931facc44971b0ccc49a5c787.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
29e91b631441caf7d1bb2876a5a63f110390763931facc44971b0ccc49a5c787.exe
Resource
win10v2004-20240419-en
General
-
Target
21c8fbf6cdd119cb28ae9f46081882e2_JaffaCakes118
-
Size
189KB
-
MD5
21c8fbf6cdd119cb28ae9f46081882e2
-
SHA1
194bfa001b8fb27a30d739967a5367ff793f216f
-
SHA256
4465cdc88569621fdfbfb5884aec08addc9b9292e9e5814bddba43fbe336c185
-
SHA512
12f2f41749ed0167d05eb29bd0f854e126a91a44653082d08815e0c8ab40668b2e13319765408b828c5dc85642423ec20566a0db5226266a2add18e1401b7de8
-
SSDEEP
3072:YPM5ifWkAlDwEo79aeTV+s59XPuxL1OMM/P2gwSaqk7sqQ5VsIuhahhTHjhqaTk1:B5tkeA4e4m9X2xL1xGP2X6RBshWND80c
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/29e91b631441caf7d1bb2876a5a63f110390763931facc44971b0ccc49a5c787.exe
Files
-
21c8fbf6cdd119cb28ae9f46081882e2_JaffaCakes118.zip
Password: infected
-
29e91b631441caf7d1bb2876a5a63f110390763931facc44971b0ccc49a5c787.exe.exe windows:5 windows x86 arch:x86
31a6da9b540e615d3555dc8647da9a85
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadAcceleratorsA
LoadStringA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadCursorA
LoadIconA
RegisterClassExA
BeginPaint
EndPaint
PostQuitMessage
LoadBitmapA
DefWindowProcA
MessageBoxA
PostMessageA
DestroyWindow
SetFocus
CreateWindowExA
MoveWindow
SendMessageA
ReleaseDC
GetWindowRect
SetWindowPos
SetWindowTextA
GetScrollPos
LockWindowUpdate
OpenClipboard
GetWindowPlacement
MapWindowPoints
ModifyMenuW
GetCursorPos
EndDeferWindowPos
EnableMenuItem
ShowCaret
GetActiveWindow
wsprintfW
GetScrollRange
RegisterClassA
SetWindowLongA
GetWindowLongA
GetClassNameA
SetDlgItemTextA
kernel32
SetStdHandle
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LCMapStringEx
HeapSize
GetStringTypeW
HeapReAlloc
HeapAlloc
RtlUnwind
LoadLibraryW
OutputDebugStringW
LoadLibraryExW
IsDebuggerPresent
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
SetFilePointerEx
HeapFree
LeaveCriticalSection
EnterCriticalSection
IsProcessorFeaturePresent
GetModuleHandleW
TerminateProcess
GetCurrentProcess
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetStartupInfoA
WideCharToMultiByte
MapViewOfFile
lstrlenA
DeleteFileA
lstrcpyA
GetCurrentDirectoryA
GetCommandLineA
GetModuleHandleA
GetSystemInfo
GetProcessHeap
SleepEx
SetLastError
GetCommandLineW
GetVersionExA
WriteConsoleW
CloseHandle
Sleep
GetCurrentThreadId
GetLastError
InterlockedIncrement
InterlockedDecrement
CreateFileW
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
GetProcAddress
MultiByteToWideChar
GetStdHandle
WriteFile
GetModuleFileNameW
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
InitOnceExecuteOnce
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetTickCount64
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
Sections
.text Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 110KB - Virtual size: 110KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ