Static task
static1
Behavioral task
behavioral1
Sample
ad415674c59017d7bba587b60f5108e9_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ad415674c59017d7bba587b60f5108e9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ad415674c59017d7bba587b60f5108e9_JaffaCakes118
-
Size
276KB
-
MD5
ad415674c59017d7bba587b60f5108e9
-
SHA1
b600fdc8cfa5c7f41d6d0ddcee977e6129552063
-
SHA256
3e0205f920e1cb93fc26714e50b732072029d1fd4f0e4c7b96426c2bf4437a33
-
SHA512
051f0d3c2958c49969024ae2edff68b281bb560bd0443516926f68f80ba1c62e9c1956b58c36dacaab425a179f0a3f06e856debb52de6c4dd216e821da1d809d
-
SSDEEP
6144:MbQNKag8vlyawBHbkyOufT/deL1I0ivNCXcmq/JIby:MbQcf8kBHbHOufT/dYivQcm+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad415674c59017d7bba587b60f5108e9_JaffaCakes118
Files
-
ad415674c59017d7bba587b60f5108e9_JaffaCakes118.exe windows:4 windows x86 arch:x86
4aa99dd7650d260accc18cb7694d4bc0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateSemaphoreA
WaitForSingleObjectEx
CloseHandle
VirtualFree
VirtualLock
IsDebuggerPresent
GlobalMemoryStatus
VirtualAlloc
ExpandEnvironmentStringsA
GetSystemTimeAsFileTime
ResetEvent
CreateMutexA
GetTempPathA
WaitForSingleObject
HeapReAlloc
ReleaseSemaphore
HeapFree
GetModuleHandleA
SetUnhandledExceptionFilter
HeapValidate
PulseEvent
GetWindowsDirectoryA
OpenEventA
OpenSemaphoreA
HeapAlloc
GetSystemInfo
CreateEventA
VirtualUnlock
ReleaseMutex
OpenProcess
CreateSemaphoreW
HeapDestroy
GetModuleHandleW
GetProcessHeap
lstrcpyW
LeaveCriticalSection
UnhandledExceptionFilter
OutputDebugStringA
HeapSize
GetTempFileNameA
OpenMutexA
ExpandEnvironmentStringsW
VirtualProtect
FreeLibrary
WideCharToMultiByte
SleepEx
GetSystemDirectoryA
DeleteCriticalSection
QueryPerformanceFrequency
GetCurrentThreadId
lstrcpyA
GlobalMemoryStatusEx
SetErrorMode
EnterCriticalSection
advapi32
GetLengthSid
FreeSid
EqualSid
LookupPrivilegeValueA
DuplicateToken
CopySid
InitializeAcl
AddAccessAllowedAce
GetTokenInformation
OpenProcessToken
OpenThreadToken
DuplicateTokenEx
GetUserNameA
SetThreadToken
LookupAccountSidA
SetSecurityDescriptorDacl
SetSecurityDescriptorSacl
AllocateAndInitializeSid
InitializeSecurityDescriptor
ImpersonateLoggedOnUser
AdjustTokenPrivileges
RevertToSelf
shlwapi
PathUnExpandEnvStringsA
PathUnExpandEnvStringsW
user32
CharUpperA
CharUpperW
wsprintfA
OemToCharBuffA
CharLowerA
CharToOemBuffA
GetSystemMetrics
ExitWindowsEx
CharLowerW
dbghelp
ImageRvaToSection
SymRegisterCallback64
SymGetModuleBase64
SymEnumerateSymbols
SymGetLineFromName64
SymUnloadModule
SymGetLinePrev
ddraw
GetSurfaceFromDC
Sections
.text Size: 121KB - Virtual size: 120KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.JMVHTQN Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kypMo Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9KB - Virtual size: 155KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rLmcQ Size: 1024B - Virtual size: 549B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.IiFbn Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Heuvi Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CiWdxqj Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.TvLEK Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rfuBt Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE