Static task
static1
Behavioral task
behavioral1
Sample
9658a3af4406302a608305e306466f9f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9658a3af4406302a608305e306466f9f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9658a3af4406302a608305e306466f9f_JaffaCakes118
-
Size
252KB
-
MD5
9658a3af4406302a608305e306466f9f
-
SHA1
325d52f020eafdc32997a6d427eb8f19b320d40c
-
SHA256
8e0a626ace6868be911aab066d7fed82204227698833ef40cf253470ce1f2aeb
-
SHA512
b0cf098c0e3b0f46eff84124b5161a0d94454848573e294bf677e787fefe850b5a9ad668598cf4e8707628e32fc41cd6d0f375a5997f21791f90344f9c6f4ded
-
SSDEEP
6144:HlVOypnTMq0/BUTBLCazegDL1mj2xPoBT08X5gw+8iJMa:HlgypnY7/BUTlCg3EiPox0I5gn8AMa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9658a3af4406302a608305e306466f9f_JaffaCakes118
Files
-
9658a3af4406302a608305e306466f9f_JaffaCakes118.exe windows:5 windows x86 arch:x86
78ea070c099be68bea3c616c1f689f24
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapViewOfFile
GetTempFileNameW
CreateProcessW
GetProcAddress
GetModuleHandleW
WriteProcessMemory
CreateRemoteThread
LoadLibraryW
GetLastError
WaitForSingleObject
MoveFileExW
Sleep
SetFileAttributesW
GetModuleFileNameW
CreateDirectoryW
CreateFileMappingW
TerminateProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetSystemTime
CloseHandle
WideCharToMultiByte
FlushFileBuffers
WriteFile
CreateFileW
DeleteFileW
GetCommandLineW
GetTempPathW
SetEndOfFile
ReadFile
HeapSetInformation
GetStartupInfoW
SetUnhandledExceptionFilter
ExitProcess
DecodePointer
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapFree
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
SetFilePointer
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
HeapAlloc
HeapSize
HeapReAlloc
IsProcessorFeaturePresent
LCMapStringW
GetStringTypeW
SetStdHandle
WriteConsoleW
GetProcessHeap
advapi32
RegCreateKeyExW
RegCloseKey
RegSetValueExW
RegCreateKeyW
AllocateAndInitializeSid
CheckTokenMembership
RegQueryValueExW
shell32
SHGetSpecialFolderPathW
shlwapi
PathFileExistsW
PathAppendW
PathGetArgsW
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 144KB - Virtual size: 152KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ