Static task
static1
Behavioral task
behavioral1
Sample
0777f90f5a648db0a8cb2dda8c4ae1c3_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0777f90f5a648db0a8cb2dda8c4ae1c3_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0777f90f5a648db0a8cb2dda8c4ae1c3_JaffaCakes118
-
Size
1.1MB
-
MD5
0777f90f5a648db0a8cb2dda8c4ae1c3
-
SHA1
e0260c9cbb505c791b1b89353c04e72b73bfdce2
-
SHA256
0bd1f4ff06755e8abcce3c3e1222c1ab8f610b952ab27b5c26be4538ccd7c500
-
SHA512
f3e70f5a917c3949e241ed697c06e189e1f71ddedcdecd4fcbbc5d59a92fa4f1dc1510c4692f392447ec61f9e9743a22fbbdfb5eaadcc0db91e18cd7a65c58d9
-
SSDEEP
24576:PORnwwkjV/+KbWCNIT0lt7bdbHqR6T8dBnB19XDS753MZ6:YGVDI0l5tH+jntDS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0777f90f5a648db0a8cb2dda8c4ae1c3_JaffaCakes118
Files
-
0777f90f5a648db0a8cb2dda8c4ae1c3_JaffaCakes118.exe windows:9 windows x86 arch:x86
abc03cb9e9bd2dadf97310d70013c1ad
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
adsldpc
MapADSTypeToLDAPType
UnMarshallLDAPToLDAPSynID
LdapInitializeSearchPreferences
AdsTypeToLdapTypeCopyConstruct
ADSIGetFirstRow
BerBvFree
GetDefaultServer
LdapReadAttribute2
MapLDAPTypeToADSType
FreeADsMem
BuildADsParentPathFromObjectInfo2
BuildADsPathFromLDAPPath2
ADsSetLastError
AdsTypeToLdapTypeCopyDNWithString
AdsTypeToLdapTypeCopyDNWithBinary
LdapCountEntries
ADsExecuteSearch
ADsWriteClassDefinition
LdapSearchInitPage
ADSIGetNextColumnName
LdapCacheAddRef
LdapTypeBinaryToString
ADsAbandonSearch
LdapSearchExtS
ADsGetLastError
LdapRenameExtS
LdapNextEntry
FreeObjectInfo
ADsFreeColumn
ADsGetObjectAttributes
AllocADsStr
LdapParsePageControl
SchemaGetClassInfoByIndex
AdsTypeFreeAdsObjects
ADSIDeleteDSObject
LdapGetSyntaxIdOfAttribute
SchemaAddRef
LdapSearch
LdapOpenObject2
LdapTypeToAdsTypeUTCTime
ReadServerSupportsIsADControl
LdapMemFree
LdapNextAttribute
kernel32
VirtualAlloc
GetFileAttributesExA
ReadFile
GetLastError
CreateEventA
GetFileTime
CallNamedPipeA
LeaveCriticalSection
WaitForMultipleObjects
InitializeCriticalSection
ReadFileScatter
HeapCreate
EnterCriticalSection
ExitProcess
HeapDestroy
GetProcessHeap
FileTimeToDosDateTime
FileTimeToSystemTime
SetFilePointer
InterlockedCompareExchange
HeapSize
CreateNamedPipeA
GetNamedPipeInfo
FileTimeToLocalFileTime
HeapFree
CreateFileA
HeapQueryInformation
OpenEventA
CloseHandle
SetEvent
HeapAlloc
SetEnvironmentVariableA
GetStringTypeA
VirtualFree
ConnectNamedPipe
GetStringTypeExA
user32
DefWindowProcA
CreateWindowExA
SendMessageA
EndPaint
ShowWindow
GetMessageA
UpdateWindow
DispatchMessageA
RegisterClassA
DestroyWindow
TranslateMessage
BeginPaint
Sections
.text Size: 943KB - Virtual size: 943KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 94KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 95KB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ