Static task
static1
Behavioral task
behavioral1
Sample
669769643471a56a4176d7571379ae0a_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
669769643471a56a4176d7571379ae0a_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
669769643471a56a4176d7571379ae0a_JaffaCakes118
-
Size
256KB
-
MD5
669769643471a56a4176d7571379ae0a
-
SHA1
f8d931172466a1d992b387f638c2f4418633e411
-
SHA256
4cc990111c2332e4083f9c240b0b53f0ae383fb7cb925ebafe210448cb5b8f1e
-
SHA512
813fcacf9a3af21103f7fbafc3f3de8e9259b4a1444d48596a3236df94d7b617d7c0db445e7cca5d6a5e68a9319a40491b908aac2e487081f15eb51e34880380
-
SSDEEP
3072:4+Uf6DJnW/XOOoy0MJwQvyEB2TN1OaXkc9hIKFAxW1+rSGMbispXY05:4/XO1BMJlvjB2T+c0KOQ1+rSBblY05
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 669769643471a56a4176d7571379ae0a_JaffaCakes118
Files
-
669769643471a56a4176d7571379ae0a_JaffaCakes118.exe windows:5 windows x86 arch:x86
fbb1f2f70588968a5c326c00dd5f7eea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LocalAlloc
GetProcessHeap
HeapLock
GetLastError
SetEvent
WaitForSingleObject
SetFilePointer
SetFileShortNameW
WriteTapemark
GetTapeStatus
GetTickCount
lstrcpynA
lstrlenW
CreateMutexA
GetModuleHandleW
GetWindowsDirectoryA
GetFileAttributesW
DeleteFileA
WaitNamedPipeW
BuildCommDCBAndTimeoutsA
SetDefaultCommConfigW
GetSystemPowerStatus
ZombifyActCtx
FindActCtxSectionStringA
LCMapStringA
FreeConsole
AttachConsole
GetConsoleTitleW
CreateConsoleScreenBuffer
GetConsoleCP
GetPrivateProfileSectionA
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineW
IsProcessorFeaturePresent
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleExW
MultiByteToWideChar
WideCharToMultiByte
HeapSize
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
CloseHandle
SetLastError
GetCurrentThreadId
GetStdHandle
GetFileType
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameW
WriteFile
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
Sleep
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LCMapStringW
LoadLibraryExW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
HeapReAlloc
SetStdHandle
FlushFileBuffers
GetConsoleMode
SetFilePointerEx
OutputDebugStringW
GetStringTypeW
WriteConsoleW
CreateFileW
advapi32
DeregisterEventSource
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 46.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cohume Size: 512B - Virtual size: 1B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.guheri Size: 512B - Virtual size: 1B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sos Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ