Static task
static1
Behavioral task
behavioral1
Sample
7564f3ba0c7eb5a1fd4838ab6d8fd15d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7564f3ba0c7eb5a1fd4838ab6d8fd15d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7564f3ba0c7eb5a1fd4838ab6d8fd15d_JaffaCakes118
-
Size
524KB
-
MD5
7564f3ba0c7eb5a1fd4838ab6d8fd15d
-
SHA1
bb861f31d570fa55eaeaa967e72205ac7aa50548
-
SHA256
7168756d7af526b734c89438e751b4a3f5dc68469d3375710af31f2b20979f55
-
SHA512
284b19479557d4d6f395a0d62b178860b3ecb90956dcb3d68283135415d5e0e7e4eb3ccf6eeb980012ad0c02f3a3b1a6c97741ca38051b2b746a9aa1abbc0e9f
-
SSDEEP
3072:0QTPiOqiW9iEIf32ALXnGSeNxhSVAkxbjHB0/tHv9uy1xOwr5gSN9K7hT8lcY2oK:0S32ZNxQieb0hvX1xOwOW4bYOl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7564f3ba0c7eb5a1fd4838ab6d8fd15d_JaffaCakes118
Files
-
7564f3ba0c7eb5a1fd4838ab6d8fd15d_JaffaCakes118.exe windows:4 windows x86 arch:x86
e6de035cab2692a047c4cd7dfa9302fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
GetSystemDirectoryA
DeleteFileA
GetFileAttributesA
OpenProcess
SizeofResource
LockResource
FreeResource
LoadResource
FindResourceA
GetModuleHandleA
TerminateThread
WaitForSingleObject
CreateThread
FreeLibrary
GetProcAddress
LoadLibraryA
GetCurrentProcessId
GetVersionExA
CreateProcessA
VirtualFreeEx
ReadProcessMemory
WriteProcessMemory
VirtualAllocEx
GetModuleFileNameA
ExitProcess
GetPrivateProfileStringA
ReleaseMutex
CreateMutexA
OpenMutexA
CopyFileA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetEndOfFile
IsBadCodePtr
IsBadReadPtr
GetStringTypeW
GetStringTypeA
SetStdHandle
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentThreadId
Sleep
CreateDirectoryA
CreateFileA
DeviceIoControl
CloseHandle
TerminateProcess
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
SetUnhandledExceptionFilter
FlushFileBuffers
LCMapStringW
GetCurrentProcess
RtlUnwind
RaiseException
HeapFree
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetStartupInfoA
GetCommandLineA
GetVersion
GetLastError
WriteFile
ReadFile
SetFilePointer
SetHandleCount
GetStdHandle
GetFileType
HeapReAlloc
HeapAlloc
HeapSize
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
GetLocaleInfoW
user32
GetClassNameA
GetWindowTextA
ShowWindow
GetWindowThreadProcessId
IsWindow
SetWindowPos
SetFocus
CreateDesktopA
SetThreadDesktop
CloseDesktop
GetThreadDesktop
PostMessageA
EnumChildWindows
GetWindowRect
SendMessageA
EnumDesktopWindows
EnumWindows
advapi32
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
SHGetFileInfoA
netapi32
Netbios
wininet
InternetCloseHandle
InternetOpenUrlA
InternetOpenA
InternetReadFile
Sections
.text Size: 156KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 320KB - Virtual size: 317KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ