Static task
static1
Behavioral task
behavioral1
Sample
a69bf6563443d7e0eb7b5d88e46342d3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a69bf6563443d7e0eb7b5d88e46342d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a69bf6563443d7e0eb7b5d88e46342d3_JaffaCakes118
-
Size
271KB
-
MD5
a69bf6563443d7e0eb7b5d88e46342d3
-
SHA1
69daac42126945197e67099cf613fa23c1cb2500
-
SHA256
d6e00ee79ce25306b7fd59d43edd0751ceae2ee7abccd2cbda9b48a834e3ad24
-
SHA512
2a721f85ea7b7d9945f72686a973152f78c7680b9f35ed8c81258b97b9dcb3d2ab1317e8a9d6baac9a00b0daae8bb17d5fb3089cc9e0737801a1a33918fded6c
-
SSDEEP
6144:HlKluOP3SWusOEvPZkxpaKsyKf6X8IWH80jxUFlL:jOP3SWusOEvPmPaaIjxUF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a69bf6563443d7e0eb7b5d88e46342d3_JaffaCakes118
Files
-
a69bf6563443d7e0eb7b5d88e46342d3_JaffaCakes118.exe windows:5 windows x86 arch:x86
5e32b1359fe6a558a6a33455c99a5cc5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
RtlUnwind
HeapSize
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
IsProcessorFeaturePresent
CloseHandle
GetCurrentDirectoryA
ExitProcess
GetModuleHandleA
LoadLibraryA
GetTapeStatus
GetProcAddress
GetLastError
GetProcessHeap
GetTickCount
HeapFree
GetCurrentProcess
InterlockedDecrement
GetCurrentThreadId
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
user32
RegisterClassA
EndPaint
GetMessageA
SetTimer
PostQuitMessage
FillRect
GetLastActivePopup
LoadIconA
GetClientRect
GetUserObjectSecurity
BeginPaint
GetIconInfo
GetDC
TranslateMessage
ChildWindowFromPoint
MessageBoxA
SetUserObjectSecurity
ReleaseDC
GetDesktopWindow
DispatchMessageA
GetMenuInfo
LoadImageA
CloseWindow
LoadCursorA
gdi32
BitBlt
DeleteEnhMetaFile
DeleteDC
CreateFontA
StretchBlt
GetCurrentObject
GetDCBrushColor
DeleteObject
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
Rectangle
FillRgn
TextOutA
SetTextAlign
GetObjectA
GetStockObject
CloseEnhMetaFile
CreateSolidBrush
GetBrushOrgEx
comdlg32
PrintDlgA
ChooseFontA
advapi32
PrivilegeCheck
GetAclInformation
GetSecurityDescriptorDacl
GetLengthSid
AddAce
AddAccessAllowedAce
InitializeAcl
GetAce
LookupPrivilegeValueA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
OpenProcessToken
userenv
GetProfileType
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 219KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ