Static task
static1
Behavioral task
behavioral1
Sample
6678157db9e8928c18ed30fd97fee4bf_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
6678157db9e8928c18ed30fd97fee4bf_JaffaCakes118
-
Size
155KB
-
MD5
6678157db9e8928c18ed30fd97fee4bf
-
SHA1
3efdb1eef8be24cb0c6e724691ef396f4c5e14d5
-
SHA256
4e8970bdf5a1ee045172dd9c0790fecc2d0bdac761c194ceba94be8fa53d32dc
-
SHA512
7ebcc98a025a2221b43330fbcc116a5f60e654b284e39f51ad6828fd0deecdb5b63cdff9ede42df89c8b8513f692d771e11348299a4bad45c8d063569d5c0d2b
-
SSDEEP
3072:BNwGl3Q9M8R/acor+/N8uMRuO+dxGQiHnwFCJIPGHOA:BNNl3Q9M8Ricoy/N8uquO+jdgHOA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6678157db9e8928c18ed30fd97fee4bf_JaffaCakes118
Files
-
6678157db9e8928c18ed30fd97fee4bf_JaffaCakes118.exe windows:5 windows x64 arch:x64
9d065669d65e06f32aea9778e0e5e246
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetSystemWow64DirectoryA
LoadLibraryW
Sleep
SizeofResource
GetSystemDirectoryA
GetLastError
GetProcAddress
SetFileAttributesA
Process32FirstW
LockResource
GetModuleFileNameA
Process32NextW
CreateToolhelp32Snapshot
WriteFile
CloseHandle
GetTempPathA
LocalFileTimeToFileTime
FreeLibrary
WaitForSingleObject
CreateRemoteThread
OpenProcess
GetSystemDirectoryW
VirtualFreeEx
GetVersionExW
VirtualAllocEx
WriteProcessMemory
GetWindowsDirectoryA
SetFileTime
GetModuleHandleW
GetCurrentProcess
SystemTimeToFileTime
LoadResource
FindResourceW
FreeResource
OutputDebugStringA
CreateFileA
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCurrentProcessId
advapi32
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyExW
RegOpenKeyExA
LookupPrivilegeValueW
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
RegQueryValueExA
shell32
ShellExecuteA
msvcr90
_amsg_exit
__wgetmainargs
__C_specific_handler
_XcptFilter
_exit
_cexit
exit
__winitenv
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
_encode_pointer
__set_app_type
__crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
fclose
strrchr
fwrite
fopen
remove
_errno
malloc
free
sprintf
memset
_wcsicmp
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1024B - Virtual size: 672B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ