Static task
static1
Behavioral task
behavioral1
Sample
0a3a63d4a758cd95a86f1ab2bdb99b15_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a3a63d4a758cd95a86f1ab2bdb99b15_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0a3a63d4a758cd95a86f1ab2bdb99b15_JaffaCakes118
-
Size
133KB
-
MD5
0a3a63d4a758cd95a86f1ab2bdb99b15
-
SHA1
6df87b6fc0e4f1957eacd0c7f53072f22bba20d6
-
SHA256
17e79cf2c350b108b1e23ae24251b64afa75414a720ccf316b2a4525d76bb59f
-
SHA512
0af1aef41f244ab062690a489c1c08daed5a2ae2c7953092f6fd16fe66b84894b9982494125c37a9476820726b430c57b50f236b8eb04429038fc120088cf772
-
SSDEEP
1536:YLf+MTef47IIEI55iHG6CM7WFjuUMU6iyfsYUWnyRumtVx99+OxfAo7Ie5:efjefdCSO6UMt3sYzykmgOuo7x5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a3a63d4a758cd95a86f1ab2bdb99b15_JaffaCakes118
Files
-
0a3a63d4a758cd95a86f1ab2bdb99b15_JaffaCakes118.exe windows:1 windows x86 arch:x86
15fe99a67d4ad9abcdb33bc83de5e9bd
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileAttributesA
CreateFileA
GetFileSize
ReadFile
HeapAlloc
UnmapViewOfFile
FlushViewOfFile
SetFilePointer
LocalFree
LocalUnlock
WriteProcessMemory
GetProcAddress
LoadLibraryA
ReadProcessMemory
GetCurrentProcess
GetModuleHandleA
LocalLock
LocalAlloc
HeapFree
DeleteFileA
CreateDirectoryA
GetFileAttributesA
FindNextFileA
FindFirstFileA
CreateFileMappingA
SetEndOfFile
GetLastError
GlobalLock
GlobalAlloc
GetDriveTypeA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
RtlUnwind
VirtualAlloc
HeapReAlloc
IsBadWritePtr
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
MapViewOfFile
WriteFile
CloseHandle
GetVersionExA
GetProcessHeap
GetSystemDirectoryA
GetWindowsDirectoryA
GetModuleFileNameA
CreateThread
GetLogicalDrives
Sleep
advapi32
SetServiceStatus
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenServiceA
ControlService
RegCreateKeyExA
RegSetValueExA
RegCloseKey
QueryServiceStatus
CreateServiceA
OpenProcessToken
StartServiceA
ChangeServiceConfigA
QueryServiceConfigA
RegisterServiceCtrlHandlerA
CloseServiceHandle
OpenSCManagerA
StartServiceCtrlDispatcherA
shell32
ShellExecuteA
ws2_32
WSAStartup
recv
send
closesocket
connect
htons
socket
recvfrom
accept
__WSAFDIsSet
select
listen
bind
sendto
user32
ExitWindowsEx
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 85KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE