Static task
static1
Behavioral task
behavioral1
Sample
4461b056022a9c36f7181ff3428f8ceb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4461b056022a9c36f7181ff3428f8ceb_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4461b056022a9c36f7181ff3428f8ceb_JaffaCakes118
-
Size
276KB
-
MD5
4461b056022a9c36f7181ff3428f8ceb
-
SHA1
e2415f2ffdef9b5c22abc9d1a3a11b4be429e3e3
-
SHA256
594b5ae9c113468ea7133c8d9bafe79d3855f65b47af3ef9c6a8771370277a35
-
SHA512
fe174d4cdcb09eb941abb0dd183a9edf50f65bf0ac24d35922d48cb0f7d10ff648909b43c09425a36f3bd5a3531967e8d4eab358dee3fb1455307f53d7548f11
-
SSDEEP
6144:HbQNKag8vlyawBHbkyOufT/deL1I0ivNCXcmq/JIby:HbQcf8kBHbHOufT/dYivQcm+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4461b056022a9c36f7181ff3428f8ceb_JaffaCakes118
Files
-
4461b056022a9c36f7181ff3428f8ceb_JaffaCakes118.exe windows:4 windows x86 arch:x86
4aa99dd7650d260accc18cb7694d4bc0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateSemaphoreA
WaitForSingleObjectEx
CloseHandle
VirtualFree
VirtualLock
IsDebuggerPresent
GlobalMemoryStatus
VirtualAlloc
ExpandEnvironmentStringsA
GetSystemTimeAsFileTime
ResetEvent
CreateMutexA
GetTempPathA
WaitForSingleObject
HeapReAlloc
ReleaseSemaphore
HeapFree
GetModuleHandleA
SetUnhandledExceptionFilter
HeapValidate
PulseEvent
GetWindowsDirectoryA
OpenEventA
OpenSemaphoreA
HeapAlloc
GetSystemInfo
CreateEventA
VirtualUnlock
ReleaseMutex
OpenProcess
CreateSemaphoreW
HeapDestroy
GetModuleHandleW
GetProcessHeap
lstrcpyW
LeaveCriticalSection
UnhandledExceptionFilter
OutputDebugStringA
HeapSize
GetTempFileNameA
OpenMutexA
ExpandEnvironmentStringsW
VirtualProtect
FreeLibrary
WideCharToMultiByte
SleepEx
GetSystemDirectoryA
DeleteCriticalSection
QueryPerformanceFrequency
GetCurrentThreadId
lstrcpyA
GlobalMemoryStatusEx
SetErrorMode
EnterCriticalSection
advapi32
GetLengthSid
FreeSid
EqualSid
LookupPrivilegeValueA
DuplicateToken
CopySid
InitializeAcl
AddAccessAllowedAce
GetTokenInformation
OpenProcessToken
OpenThreadToken
DuplicateTokenEx
GetUserNameA
SetThreadToken
LookupAccountSidA
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
AllocateAndInitializeSid
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
AdjustTokenPrivileges
RevertToSelf
shlwapi
PathUnExpandEnvStringsA
PathUnExpandEnvStringsW
user32
CharUpperA
CharUpperW
wsprintfA
OemToCharBuffA
CharLowerA
CharToOemBuffA
GetSystemMetrics
ExitWindowsEx
CharLowerW
dbghelp
ImageRvaToSection
SymRegisterCallback64
SymGetModuleBase64
SymEnumerateSymbols
SymGetLineFromName64
SymUnloadModule
SymGetLinePrev
ddraw
GetSurfaceFromDC
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.JMVHTQN Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kypMo Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rLmcQ Size: 1024B - Virtual size: 549B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.IiFbn Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Heuvi Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CiWdxqj Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.TvLEK Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rfuBt Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE