Static task
static1
Behavioral task
behavioral1
Sample
0a7eb52e422f1b485395a112b08cca94_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0a7eb52e422f1b485395a112b08cca94_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0a7eb52e422f1b485395a112b08cca94_JaffaCakes118
-
Size
276KB
-
MD5
0a7eb52e422f1b485395a112b08cca94
-
SHA1
a32f22efa7a2a0f4377d3fdb9625c74952a6a66e
-
SHA256
d2e87eba19ce8a0640f0144a42b588972bc954a6206f86da2378930140698f44
-
SHA512
0afe8fd75d8839f95140d8ef2de0f7a4726efa5b7410262a0352085d14461e5ea2ca3356572a34ac92bd138493d41ad8f406d49ba96a9e1dc205fb19cf170f59
-
SSDEEP
6144:0bQNKag8vlyawBHbkyOufT/deL1I0ivNCXcmq/JIby:0bQcf8kBHbHOufT/dYivQcm+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a7eb52e422f1b485395a112b08cca94_JaffaCakes118
Files
-
0a7eb52e422f1b485395a112b08cca94_JaffaCakes118.exe windows:4 windows x86 arch:x86
4aa99dd7650d260accc18cb7694d4bc0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateSemaphoreA
WaitForSingleObjectEx
CloseHandle
VirtualFree
VirtualLock
IsDebuggerPresent
GlobalMemoryStatus
VirtualAlloc
ExpandEnvironmentStringsA
GetSystemTimeAsFileTime
ResetEvent
CreateMutexA
GetTempPathA
WaitForSingleObject
HeapReAlloc
ReleaseSemaphore
HeapFree
GetModuleHandleA
SetUnhandledExceptionFilter
HeapValidate
PulseEvent
GetWindowsDirectoryA
OpenEventA
OpenSemaphoreA
HeapAlloc
GetSystemInfo
CreateEventA
VirtualUnlock
ReleaseMutex
OpenProcess
CreateSemaphoreW
HeapDestroy
GetModuleHandleW
GetProcessHeap
lstrcpyW
LeaveCriticalSection
UnhandledExceptionFilter
OutputDebugStringA
HeapSize
GetTempFileNameA
OpenMutexA
ExpandEnvironmentStringsW
VirtualProtect
FreeLibrary
WideCharToMultiByte
SleepEx
GetSystemDirectoryA
DeleteCriticalSection
QueryPerformanceFrequency
GetCurrentThreadId
lstrcpyA
GlobalMemoryStatusEx
SetErrorMode
EnterCriticalSection
advapi32
GetLengthSid
FreeSid
EqualSid
LookupPrivilegeValueA
DuplicateToken
CopySid
InitializeAcl
AddAccessAllowedAce
GetTokenInformation
OpenProcessToken
OpenThreadToken
DuplicateTokenEx
GetUserNameA
SetThreadToken
LookupAccountSidA
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
AllocateAndInitializeSid
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
AdjustTokenPrivileges
RevertToSelf
shlwapi
PathUnExpandEnvStringsA
PathUnExpandEnvStringsW
user32
CharUpperA
CharUpperW
wsprintfA
OemToCharBuffA
CharLowerA
CharToOemBuffA
GetSystemMetrics
ExitWindowsEx
CharLowerW
dbghelp
ImageRvaToSection
SymRegisterCallback64
SymGetModuleBase64
SymEnumerateSymbols
SymGetLineFromName64
SymUnloadModule
SymGetLinePrev
ddraw
GetSurfaceFromDC
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.JMVHTQN Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kypMo Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rLmcQ Size: 1024B - Virtual size: 549B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.IiFbn Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Heuvi Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CiWdxqj Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.TvLEK Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rfuBt Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE