Static task
static1
Behavioral task
behavioral1
Sample
5c485539c2f24f1f8e54102a43c2df53_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
5c485539c2f24f1f8e54102a43c2df53_JaffaCakes118
-
Size
423KB
-
MD5
5c485539c2f24f1f8e54102a43c2df53
-
SHA1
3aa9d1d789ff10811f21ba1110a00b8f8fccefbd
-
SHA256
dec442f99b9cbc46799b4b1a416ec15cd90632a465c46470588552722481bdf0
-
SHA512
b5ea9bd4213ca4504aa215dc6b34fe001e435c86ac84f8c6b46c247970a3084811b3a321d789ddd922dc539020aa773ab96017faabc5579a9c6d9e4daa03addc
-
SSDEEP
6144:KvMpHU5es68BZ/Fcba3tBIj0wKXapiFSK3VB3udzk46CGjpeC4tOOU1XuuB:lHD+LTdwZKS4+dWs3tODVB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 5c485539c2f24f1f8e54102a43c2df53_JaffaCakes118
Files
-
5c485539c2f24f1f8e54102a43c2df53_JaffaCakes118.exe windows:5 windows x86 arch:x86
8bde3a5980f0138c22b1591a79ab29c0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
MoveFileExA
GetProfileIntW
SetMailslotInfo
WaitForSingleObject
FlushConsoleInputBuffer
OutputDebugStringW
GetModuleHandleW
VirtualFree
GenerateConsoleCtrlEvent
GetSystemTimeAsFileTime
GlobalAlloc
GetThreadSelectorEntry
GetSystemPowerStatus
LeaveCriticalSection
GetNamedPipeInfo
GetAtomNameW
ReadFile
GetTimeZoneInformation
SetComputerNameExW
CreateActCtxA
lstrlenW
GetNamedPipeHandleStateW
ReadConsoleOutputCharacterA
GetProcAddress
SetThreadPriorityBoost
LocalAlloc
GlobalUnWire
SetLocaleInfoW
VirtualProtect
CompareStringA
PeekConsoleInputA
OutputDebugStringA
LocalSize
FindNextVolumeA
DeleteFileA
EncodePointer
DecodePointer
EnterCriticalSection
DeleteCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeW
GetLastError
HeapFree
GetCommandLineA
RaiseException
RtlUnwind
HeapAlloc
GetCPInfo
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
IsDebuggerPresent
GetProcessHeap
ExitProcess
GetModuleHandleExW
HeapSize
SetFilePointerEx
CloseHandle
GetCurrentThreadId
GetStdHandle
GetFileType
GetModuleFileNameA
WriteFile
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetACP
IsValidCodePage
GetOEMCP
HeapReAlloc
GetConsoleCP
GetConsoleMode
LoadLibraryExW
SetStdHandle
FlushFileBuffers
WriteConsoleW
CreateFileW
Sections
.text Size: 94KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 116.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 222KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ