Static task
static1
Behavioral task
behavioral1
Sample
6622a0ec2309d27db7194199bf9a0471_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
6622a0ec2309d27db7194199bf9a0471_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6622a0ec2309d27db7194199bf9a0471_JaffaCakes118
-
Size
712KB
-
MD5
6622a0ec2309d27db7194199bf9a0471
-
SHA1
3ce2190c10499da84e2e707a7793b46cc7f2be5f
-
SHA256
2cd708041b9f091e40d4caed1966f703b431c969c737decef942e61608a38417
-
SHA512
c598d1770e534c89f4ab17b92ad3b5a546827849f349b0696805b89f8fb1aa2c379a0a1f8e5673915beab1ec6301d10b5a3f5faa67c6d741096950eb823f4559
-
SSDEEP
12288:ss3YkMB04uUXJvcN1F1iftB8RaY+xAfDWvY0dS0hY5Tq3lv7BlUti9AKAoEpa7tx:sobMBxz9cN0B7XAfDWvfdx5eNKAFw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6622a0ec2309d27db7194199bf9a0471_JaffaCakes118
Files
-
6622a0ec2309d27db7194199bf9a0471_JaffaCakes118.exe windows:5 windows x86 arch:x86
ae28a79084c37128e318fc2c194679da
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileTime
SetFileTime
GetCurrentProcessId
CreateFileMappingW
CreateEventW
MapViewOfFile
GetTempPathW
GetTempFileNameW
WaitForSingleObject
UnmapViewOfFile
SetEvent
OpenEventW
HeapDestroy
HeapAlloc
GetFileSize
HeapReAlloc
HeapSize
GetProcessHeap
RaiseException
EnterCriticalSection
LeaveCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetModuleFileNameW
GetProcAddress
GetModuleHandleW
CreateProcessW
CreateDirectoryW
Sleep
FindResourceExW
FindResourceW
LoadResource
LockResource
MoveFileW
DeleteFileW
IsBadWritePtr
CloseHandle
SizeofResource
WriteFile
CreateFileW
HeapFree
GetStringTypeW
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
RtlUnwind
GetCommandLineW
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
SetUnhandledExceptionFilter
ExitProcess
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
IsProcessorFeaturePresent
LoadLibraryW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSection
user32
LoadStringW
LoadStringA
advapi32
RegOpenKeyExW
RegSetValueExA
RegCreateKeyExW
ControlService
StartServiceW
OpenServiceW
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
RegCloseKey
RegSetValueExW
RegCreateKeyW
CloseServiceHandle
ChangeServiceConfig2W
ChangeServiceConfigW
CreateServiceW
OpenSCManagerW
shell32
SHGetFolderPathW
shlwapi
PathAppendW
PathStripToRootW
PathFileExistsW
Sections
.text Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 309KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 274KB - Virtual size: 274KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ