Static task
static1
Behavioral task
behavioral1
Sample
aa9a6e545e1baf23b38d189656633865_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
aa9a6e545e1baf23b38d189656633865_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
aa9a6e545e1baf23b38d189656633865_JaffaCakes118
-
Size
154KB
-
MD5
aa9a6e545e1baf23b38d189656633865
-
SHA1
ecdf259bf77fe2897a274cb8d8e05176475957e9
-
SHA256
4e3610aeb0f4d0699ce1d6065ab3149dc2c8b6efcf62c50e7920fb8d30aeed88
-
SHA512
b9f447ee5dfd4be12348ab1269833fae7baa211e5f018fec840a372f635269cf7711a05c6fe52ebd154467db55ffe0b74d4b164e823247700cbfdc8cfa92e578
-
SSDEEP
3072:KFwfc3sx4hPqpxBNfXcOQx5KUWWZKeyFIeKAGDtjRJ:ScxbpXVvQW6ZKeS7KAGDt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa9a6e545e1baf23b38d189656633865_JaffaCakes118
Files
-
aa9a6e545e1baf23b38d189656633865_JaffaCakes118.exe windows:5 windows x86 arch:x86
0c89013345a10efb7c589f8acb037ddb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FatalExit
VirtualProtect
GetFileInformationByHandle
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
AddAtomA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
HeapSize
FlushFileBuffers
GetConsoleMode
GetConsoleCP
GetModuleHandleA
SetLastError
GetLastError
GetThreadSelectorEntry
LoadLibraryW
TerminateThread
GlobalAlloc
GetTickCount
ExitProcess
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetModuleHandleW
Sleep
GetProcAddress
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
MultiByteToWideChar
ReadFile
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
CloseHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetStdHandle
user32
GetNextDlgTabItem
EndPaint
CloseClipboard
TranslateAcceleratorW
LoadMenuIndirectA
GetRawInputData
LoadImageW
LoadBitmapA
LoadIconA
BeginPaint
GetUpdateRect
LoadAcceleratorsW
LoadKeyboardLayoutW
LoadIconW
GetRegisteredRawInputDevices
GetAltTabInfoA
PeekMessageA
LoadStringW
GetDialogBaseUnits
LookupIconIdFromDirectory
DispatchMessageW
LoadCursorW
gdi32
CombineRgn
CopyEnhMetaFileW
FillPath
ColorCorrectPalette
advapi32
AddAccessAllowedAce
AdjustTokenGroups
AdjustTokenPrivileges
shell32
ShellAboutA
FindExecutableW
DragQueryFileA
Sections
.text Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 778KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ