Static task
static1
Behavioral task
behavioral1
Sample
a843b867c552b8d6b2fed68ee28b2357_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a843b867c552b8d6b2fed68ee28b2357_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a843b867c552b8d6b2fed68ee28b2357_JaffaCakes118
-
Size
872KB
-
MD5
a843b867c552b8d6b2fed68ee28b2357
-
SHA1
7b72f1ba8bc16b3929cbc74b4c1bc4e161972073
-
SHA256
8ba6c1cc47438d29201d8f53b281aa510fac747dfc4963dadcaa1d7cf42630e4
-
SHA512
d3d73fa9559910dcdd209c4c22e2265fb8608c47c60b743b8b99cc4dfa0afa32abb62c3dffbb2520300d97310bd403f1453eff9e39af86a62d17dfc772724014
-
SSDEEP
24576:7G6khZxiJ2vB5vNQkAxCM7YIOlFjJjyD8F6o:SfjiJ6vRICM7Yj4DRo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a843b867c552b8d6b2fed68ee28b2357_JaffaCakes118
Files
-
a843b867c552b8d6b2fed68ee28b2357_JaffaCakes118.exe windows:5 windows x86 arch:x86
9a0bd49faaea135f88378bd18a014bdb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlDelete
wcschr
RtlAddCompoundAce
ZwClearEvent
ZwUnmapViewOfSection
RtlDeregisterWaitEx
NtOpenSymbolicLinkObject
memchr
RtlFormatCurrentUserKeyPath
ZwSetVolumeInformationFile
CsrCaptureMessageMultiUnicodeStringsInPlace
RtlCompareString
NtFreeUserPhysicalPages
RtlConsoleMultiByteToUnicodeN
RtlCharToInteger
RtlFindLeastSignificantBit
wcsstr
NtPulseEvent
RtlImpersonateSelf
RtlAddAccessAllowedAce
ZwQueryKey
RtlAddAccessDeniedAce
RtlDeleteNoSplay
ZwReadVirtualMemory
NtReadRequestData
RtlConvertToAutoInheritSecurityObject
DbgUiSetThreadDebugObject
ZwSetLdtEntries
RtlAddAccessDeniedObjectAce
ZwRemoveIoCompletion
NtSaveKeyEx
RtlCaptureStackBackTrace
ZwRegisterThreadTerminatePort
ZwReplyWaitReplyPort
RtlGetCallersAddress
ZwListenPort
NtAlertResumeThread
NtCompactKeys
ZwSetSystemInformation
ZwDebugContinue
msvcrt40
?sync@streambuf@@UAEHXZ
mbtowc
?iword@ios@@QBEAAJH@Z
_tzname
??_Eostrstream@@UAEPAXI@Z
_wcsupr
??_Gstrstream@@UAEPAXI@Z
_execvp
?osfx@ostream@@QAEXXZ
??1strstreambuf@@UAE@XZ
clock
_mbsncoll
div
_mbclen
?rdbuf@strstream@@QBEPAVstrstreambuf@@XZ
??0__non_rtti_object@@QAE@PBD@Z
??_Ebad_typeid@@UAEPAXI@Z
?seekp@ostream@@QAEAAV1@JW4seek_dir@ios@@@Z
??6ostream@@QAEAAV0@P6AAAV0@AAV0@@Z@Z
_flsbuf
_rmdir
_spawnve
_mbsnicmp
?underflow@strstreambuf@@UAEHXZ
_putw
??_Distrstream@@QAEXXZ
??6ostream@@QAEAAV0@C@Z
??1stdiostream@@UAE@XZ
?flush@@YAAAVostream@@AAV1@@Z
_ltow
??_Gistream_withassign@@UAEPAXI@Z
??_Dstdiostream@@QAEXXZ
??4strstream@@QAEAAV0@AAV0@@Z
_lseek
sin
??0logic_error@@QAE@ABQBD@Z
frexp
_wfreopen
_wchmod
msasn1
ASN1BEREncEoid
ASN1bitstring_free
ASN1BERDecChar32String
ASN1ztcharstring_free
ASN1BEREncBitString
ASN1_SetEncoderOption
ASN1ztcharstring_cmp
ASN1_CreateDecoder
ASN1objectidentifier2_cmp
ASN1CEREncCharString
ASN1BEREncS32
ASN1BEREncCheck
ASN1BEREncFlush
ASN1BEREncOctetString
ASN1BEREncNull
ASN1BERDecExplicitTag
ASN1BEREncObjectIdentifier2
ASN1_CloseModule
ASN1BERDecChar16String
ASN1objectidentifier_free
ASN1EncSetError
ASN1_Encode
ASN1intxisuint32
ASN1Free
ASN1BERDecBool
ASN1bitstring_cmp
ASN1BERDecOpenType2
ASN1ztchar16string_free
ASN1BEREncUTF8String
ASN1char16string_free
ASN1ztchar16string_cmp
ASN1BEREncExplicitTag
gdi32
PlayEnhMetaFile
CopyMetaFileW
EngDeleteSemaphore
XLATEOBJ_iXlate
GdiGetDevmodeForPage
EudcUnloadLinkW
EngGetCurrentCodePage
DdEntry28
DdEntry14
GdiConvertAndCheckDC
StartDocW
DdEntry25
OffsetWindowOrgEx
GdiSetLastError
AbortDoc
GdiPlayPrivatePageEMF
GetTextMetricsW
FillRgn
GdiConvertDC
CopyEnhMetaFileA
GetMetaFileA
SetFontEnumeration
DdEntry50
CreateFontIndirectExA
GdiAddFontResourceW
GetRgnBox
EnumFontsW
GetEUDCTimeStampExW
GdiConvertBitmap
DdEntry48
GetCharWidthW
GetColorAdjustment
CreateScalableFontResourceA
FloodFill
CreateCompatibleDC
kernel32
InterlockedPushEntrySList
EnumCalendarInfoW
QueryInformationJobObject
SetConsoleScreenBufferSize
GetCurrentThreadId
OpenWaitableTimerA
Module32FirstW
GetEnvironmentStringsA
AddLocalAlternateComputerNameA
CreateRemoteThread
lstrcatA
SetConsoleHardwareState
GetCurrentThread
TlsGetValue
InvalidateConsoleDIBits
GetPrivateProfileStringW
GlobalMemoryStatusEx
SwitchToFiber
EnumResourceLanguagesA
DefineDosDeviceW
LCMapStringA
VirtualAlloc
HeapCreate
LoadLibraryA
SetVolumeLabelA
SetFileShortNameA
GetLastError
SignalObjectAndWait
EscapeCommFunction
DeleteCriticalSection
WriteConsoleInputA
BuildCommDCBAndTimeoutsA
GlobalAlloc
GenerateConsoleCtrlEvent
adsldpc
SchemaGetClassInfo
ADsGetPreviousRow
LdapControlFree
SchemaIsClassAContainer
AdsTypeFreeAdsObjects
GetDomainDNSNameForDomain
LdapGetSchemaObjectCount
ADsHelperGetCurrentRowMessage
LdapParsePageControl
?GetNextToken@CLexer@@QAEJPAGPAK@Z
ConvertSidToString
InitObjectInfo
AllocADsStr
FindSearchTableIndex
UnMarshallLDAPToLDAPSynID
ADsAbandonSearch
LdapCompareExt
SchemaGetClassInfoByIndex
ADsSetLastError
ADsFreeColumn
Component
LdapInitializeSearchPreferences
LdapSearchInitPage
ADsSetObjectAttributes
AdsTypeToLdapTypeCopyGeneralizedTime
ADsGetFirstRow
Sections
.text Size: 269KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 253KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 346KB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ