Static task
static1
Behavioral task
behavioral1
Sample
7376b3f126a75dd8847b9c95bf5eb2a9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7376b3f126a75dd8847b9c95bf5eb2a9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7376b3f126a75dd8847b9c95bf5eb2a9_JaffaCakes118
-
Size
106KB
-
MD5
7376b3f126a75dd8847b9c95bf5eb2a9
-
SHA1
ab91ac36906039a54ee7991a3672a3f47b2c9f92
-
SHA256
ec6febd2b4f2a885b8ec7dc05ff4ed0c787fde0b5c46539fb16378b7b6d9f65d
-
SHA512
f9201a8f37fc6ebd7bbf7796519024be15bbc4946bf94eeb13daf9d78ed4c464028001a09f1f0f1fc8e988a5a3ed9d150b0049f1ea1d40b3541386959a1beb51
-
SSDEEP
3072:QPcurVWzb6+hh7unAbdicNgJ159UecnuEO:YzVWtSAReUp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7376b3f126a75dd8847b9c95bf5eb2a9_JaffaCakes118
Files
-
7376b3f126a75dd8847b9c95bf5eb2a9_JaffaCakes118.exe windows:5 windows x86 arch:x86
a3c4433e41a0aeaa33423497052555f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
ws2_32
connect
kernel32
CreateMutexA
lstrcpyA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
OutputDebugStringA
GetCommandLineA
WriteProcessMemory
lstrlenW
GetModuleFileNameW
Sleep
ReadProcessMemory
lstrcmpA
GetModuleHandleA
GetCurrentProcess
AllocConsole
CloseHandle
WriteConsoleA
lstrlenA
GetStartupInfoA
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
WideCharToMultiByte
GetModuleHandleW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapAlloc
RaiseException
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetLastError
RtlUnwind
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CompareStringA
MultiByteToWideChar
CompareStringW
SetEnvironmentVariableA
InitializeCriticalSectionAndSpinCount
HeapSize
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
lstrcmpiA
lstrcatA
ExitProcess
user32
PostQuitMessage
SetFocus
EnableMenuItem
RegisterClassExA
CallWindowProcA
SetWindowLongA
KillTimer
IsWindow
DispatchMessageA
ShowWindow
GetMessageA
InsertMenuA
DestroyIcon
CreateMenu
UpdateWindow
MessageBoxA
MessageBoxW
gdi32
DeleteObject
TextOutA
SetBkMode
CreateDIBitmap
comdlg32
ChooseFontA
GetSaveFileNameA
Sections
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ