Static task
static1
Behavioral task
behavioral1
Sample
66ec920b2d7b5aeb7851af412975de59_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
66ec920b2d7b5aeb7851af412975de59_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
66ec920b2d7b5aeb7851af412975de59_JaffaCakes118
-
Size
44KB
-
MD5
66ec920b2d7b5aeb7851af412975de59
-
SHA1
48dffb50bfc6214caea30c50e27bcbd544df789b
-
SHA256
31a319376fd010ebb9e2b9dc91cff120692e20bb8754363196bcd7d0730b9d55
-
SHA512
10e6bbe504251af03b57accf3c8b33e1daccd564bb9ec9a69f20d07d94e91a14e3254da71016265963f5bc24dcabdc84bac84f1cc9c85ff4fd240c4fef4b4b06
-
SSDEEP
768:kHUmN+VxNVH0OhjGLy6MIAs+UgBVoEq1A+YH1IPMZh:kHU7xNVH0KaLy6MIr+xPq1AgMZh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 66ec920b2d7b5aeb7851af412975de59_JaffaCakes118
Files
-
66ec920b2d7b5aeb7851af412975de59_JaffaCakes118.exe windows:4 windows x86 arch:x86
f2a2cab389f212a094369940616763c1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Thread32First
CreateToolhelp32Snapshot
Process32Next
Process32First
CloseHandle
VirtualProtectEx
GetCurrentProcess
ResumeThread
SetThreadContext
GetThreadContext
SuspendThread
VirtualAllocEx
Thread32Next
FindFirstFileA
VirtualFreeEx
VirtualProtect
CreateRemoteThread
GetProcAddress
GetModuleHandleA
Sleep
GetPrivateProfileStringA
ExitProcess
GetModuleFileNameA
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
OpenThread
OpenProcess
ReadProcessMemory
WriteProcessMemory
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
GetVersionExA
HeapAlloc
HeapFree
SetUnhandledExceptionFilter
TerminateProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
HeapSize
IsBadReadPtr
IsBadCodePtr
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetACP
GetOEMCP
GetCPInfo
LoadLibraryA
InterlockedExchange
VirtualQuery
GetLocaleInfoA
GetSystemInfo
LCMapStringA
LCMapStringW
GetSystemTimeAsFileTime
advapi32
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
user32
FindWindowA
GetWindowThreadProcessId
MessageBoxA
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE