Static task
static1
Behavioral task
behavioral1
Sample
621cfb12233c7432f6881347bded5a57_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
621cfb12233c7432f6881347bded5a57_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
621cfb12233c7432f6881347bded5a57_JaffaCakes118
-
Size
132KB
-
MD5
621cfb12233c7432f6881347bded5a57
-
SHA1
ab871369a1d336031620c6938d87a9ef69ee03ba
-
SHA256
07b22a0e85c4f95916a66a6f603adbfd5f152fa2dcaf19603fb95e0dafcc099c
-
SHA512
c5e365b035ca4dbfe98b2d483dd398c247e688155ca272fcd8271ead64cd23a1a7a928172d8c258c8f48290d9097050defaf873bde60570d5465ab341045266d
-
SSDEEP
3072:+D4beJt/UAKF4ba3Hwi573QVx78b4Mt2rXH4Mzm:+D4+t/Uia3H153KK2EMS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 621cfb12233c7432f6881347bded5a57_JaffaCakes118
Files
-
621cfb12233c7432f6881347bded5a57_JaffaCakes118.exe windows:5 windows x86 arch:x86
2952086a0bf0b1eec97f0c4c95fa5c0a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
psapi
GetModuleFileNameExA
shlwapi
PathFileExistsA
ntdll
strchr
strrchr
_allmul
_alldvrm
_chkstk
_alldiv
isdigit
strstr
_aulldvrm
RtlUnwind
_aullshr
_allshl
_aulldiv
wininet
InternetCheckConnectionA
InternetOpenA
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
kernel32
FlushFileBuffers
CreateFileW
GetStringTypeW
DecodePointer
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
GetModuleFileNameA
Process32First
FindFirstFileA
GetCurrentProcess
WriteFile
TerminateProcess
GetProcessId
CreateMutexA
WaitForSingleObject
ReleaseMutex
OpenProcess
CreateToolhelp32Snapshot
MultiByteToWideChar
Sleep
CopyFileA
OutputDebugStringW
CreateFileA
GetCurrentThread
GetConsoleCP
Process32Next
CloseHandle
GetSystemInfo
CreateThread
SetFileAttributesA
GetThreadContext
SystemTimeToFileTime
GetConsoleWindow
CreateDirectoryA
GetSystemTime
IsDebuggerPresent
HeapAlloc
GetProcAddress
GetProcessHeap
TlsFree
GetFileAttributesExW
CreateProcessA
GetExitCodeProcess
HeapFree
GetFileType
ReadConsoleW
GetConsoleMode
SetFilePointerEx
HeapSize
HeapReAlloc
SetEndOfFile
WriteConsoleW
TlsSetValue
LCMapStringW
CompareStringW
GetACP
GetCommandLineW
GetCommandLineA
WideCharToMultiByte
GetStdHandle
ReadFile
GetModuleHandleExW
ExitProcess
LoadLibraryExW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
GetModuleHandleW
RaiseException
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
FreeLibrary
user32
GetForegroundWindow
GetWindowTextLengthA
GetWindowTextA
ShowWindow
EnumDisplayDevicesA
MessageBoxA
GetWindowThreadProcessId
advapi32
RegQueryValueExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteA
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ