_gekelberifin@8
Static task
static1
Behavioral task
behavioral1
Sample
ababb33f14c131fa615563cb66e0539c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ababb33f14c131fa615563cb66e0539c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ababb33f14c131fa615563cb66e0539c_JaffaCakes118
-
Size
3.7MB
-
MD5
ababb33f14c131fa615563cb66e0539c
-
SHA1
d8052512329718a979f125c779efa2ca3c6fc433
-
SHA256
0c8089e11431f9671cf88ba3624807a98787c42429a6d2e722009528ddbf6fd0
-
SHA512
6ce92adf459254d8732f8761b82496e56f53778b7d14e588d468d92ca5007d660049103d0a978d35f272de1d38576ea034d49d3f9c132a6df8716cf4090c3e6d
-
SSDEEP
98304:th6u+y5P5cpCL6dUO9yCBtjm7eWP8cvW+gTcr+njrB7:thU6CCmet2jm7hBInjZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ababb33f14c131fa615563cb66e0539c_JaffaCakes118
Files
-
ababb33f14c131fa615563cb66e0539c_JaffaCakes118.exe windows:5 windows x86 arch:x86
7d72ff7a94806db86f39e4426c9b5a08
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenFile
lstrlenA
WritePrivateProfileStructA
TlsGetValue
GetNumberOfConsoleInputEvents
InterlockedDecrement
ScrollConsoleScreenBufferW
CreateJobObjectW
GetUserDefaultLCID
OpenSemaphoreA
ConnectNamedPipe
CallNamedPipeW
_lclose
GetProcessPriorityBoost
CreateNamedPipeW
ReadConsoleW
GetCommandLineA
SetCommTimeouts
FindResourceExA
LoadLibraryW
Sleep
GetPrivateProfileStructW
GetVersionExW
DeleteVolumeMountPointW
WriteConsoleW
GetBinaryTypeA
lstrcatA
SetThreadPriority
GlobalUnlock
DeactivateActCtx
SetVolumeLabelA
FillConsoleOutputCharacterW
GetLastError
IsDBCSLeadByteEx
GetTapeStatus
ReadFileEx
EnterCriticalSection
_hwrite
SetFileApisToOEM
GetLocalTime
OpenMutexA
LocalAlloc
SetCalendarInfoW
BeginUpdateResourceA
PostQueuedCompletionStatus
WriteProfileSectionW
AddAtomA
GetTapeParameters
WaitForMultipleObjects
GetModuleHandleA
LoadLibraryExA
FreeEnvironmentStringsW
EnumResourceNamesA
VirtualProtect
EnumDateFormatsW
GetConsoleCursorInfo
LocalSize
lstrcpyA
SetCurrentDirectoryA
FileTimeToDosDateTime
GetStartupInfoA
SetUnhandledExceptionFilter
GetModuleHandleW
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapAlloc
VirtualAlloc
HeapReAlloc
RtlUnwind
HeapSize
GetLocaleInfoA
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
GetCursorPos
gdi32
GetBitmapDimensionEx
Exports
Exports
Sections
.text Size: 3.7MB - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yabaz Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hiroge Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ