?trash@@YGXXZ
Static task
static1
Behavioral task
behavioral1
Sample
a109b690d1e754c3fef0e70b3c9a6523_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a109b690d1e754c3fef0e70b3c9a6523_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a109b690d1e754c3fef0e70b3c9a6523_JaffaCakes118
-
Size
444KB
-
MD5
a109b690d1e754c3fef0e70b3c9a6523
-
SHA1
a75597418d98fe20e7bf996290fe7f365ecdf192
-
SHA256
1836c6be0c4713d6b52c468490e7ae649b80d0e0856a0f76eb53504f3e2eeba1
-
SHA512
714b28f18cbf1e1c196a1ae9594fdffad0cb8cd880351af2b3fd8a5b86087a04d4cc9f1cd1e14a7209465b9ff29e72564c79b96aae1f69a094e8dd7ef35059f3
-
SSDEEP
12288:fJMyZPKOz2ieFjOBRaYyJji7Doy8dZU8eNjbvT:fyyZPKOVeUBRYJji7Doy8gJzT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a109b690d1e754c3fef0e70b3c9a6523_JaffaCakes118
Files
-
a109b690d1e754c3fef0e70b3c9a6523_JaffaCakes118.exe windows:5 windows x86 arch:x86
d6910d180a6afca89d1b8aca2e6b5050
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
malloc
free
_except_handler3
realloc
atl
ord30
ord16
ord21
ord23
ord15
ord32
ord58
ord26
ord27
ord45
ord44
ord43
ord31
kernel32
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
TlsFree
TlsAlloc
DisableThreadLibraryCalls
FreeLibrary
GetModuleFileNameA
GetProcAddress
LoadLibraryW
GetModuleFileNameW
LeaveCriticalSection
InitializeCriticalSection
FlushInstructionCache
GetCurrentProcess
SetLastError
TlsSetValue
TlsGetValue
GetCurrentThreadId
lstrcatW
lstrcpyW
InterlockedCompareExchange
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
GetProcessHeap
HeapAlloc
VirtualFree
VirtualAlloc
GetLastError
LocalFree
LocalAlloc
ExpandEnvironmentStringsW
CreateProcessW
CloseHandle
DelayLoadFailureHook
lstrlenW
lstrcpynW
GetWindowsDirectoryW
EnterCriticalSection
GetModuleHandleW
user32
GetClassInfoExW
LoadAcceleratorsW
GetKeyState
DestroyAcceleratorTable
IsWindow
IntersectRect
EqualRect
OffsetRect
SetWindowRgn
RegisterClassExW
GetWindowLongW
SetWindowLongW
UnionRect
PtInRect
DestroyWindow
CreateWindowExW
DefWindowProcW
WaitForInputIdle
MapWindowPoints
SetWindowsHookExW
GetWindowRect
PostMessageW
SendMessageW
CallNextHookEx
UnhookWindowsHookEx
FindWindowW
BeginPaint
GetClientRect
EndPaint
GetParent
ShowWindow
GetFocus
IsChild
SetFocus
LoadStringW
CallWindowProcW
SetWindowPos
InvalidateRect
advapi32
RegCloseKey
RegDeleteKeyW
credui
CredUIReadSSOCredW
gdi32
RestoreDC
SetViewportOrgEx
SetWindowOrgEx
SetMapMode
SaveDC
LPtoDP
GetDeviceCaps
CreateRectRgnIndirect
DeleteDC
ole32
OleRegGetUserType
CreateOleAdviseHolder
CoTaskMemFree
CoCreateInstance
OleRegEnumVerbs
IsAccelerator
oleaut32
OleCreatePropertyFrame
SysAllocStringLen
SysAllocString
SysStringLen
RegisterTypeLi
LoadTypeLi
VariantChangeType
SysStringByteLen
SysFreeString
VariantClear
LoadRegTypeLi
shlwapi
SHDeleteKeyW
SHGetValueW
ord437
ord193
StrCatBuffW
ord24
Exports
Exports
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 416KB - Virtual size: 420KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ