Static task
static1
Behavioral task
behavioral1
Sample
LJ_INFO.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
LJ_INFO.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
LJ_MOF32.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
LJ_MOF32.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
PEWRSEC.com
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
PEWRSEC.com
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
SAMPLE.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
SAMPLE.exe
Resource
win10v2004-20240802-en
General
-
Target
ae7e96df2376624773cea38247e85222_JaffaCakes118
-
Size
29KB
-
MD5
ae7e96df2376624773cea38247e85222
-
SHA1
b2d5d3948d618d1cd97ef1ce43b0670724e5b259
-
SHA256
5af736dd637c0654d70c171069cc33f6eb723c7effcbebed9e306597013a8c66
-
SHA512
37584c7293d574997c70b8d6a01a9cf6d350e6625ed044769aaf464050283f6e9de5cbd898a4e6ab15dcbf3a5dbe94febe3b5823125657a3a0e94d373d795284
-
SSDEEP
768:728OooFadLgoL2hUnGIxtum4XAHD3fh0Uq1BLiusbOt7NgI:72n1FELgoLBRuZAHD3J0hLLiu1
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/LJ_MOF32.EXE unpack001/SAMPLE.EXE
Files
-
ae7e96df2376624773cea38247e85222_JaffaCakes118.zip
-
LJ_INFO.EXE
-
LJ_MOF32.ASM
-
LJ_MOF32.EXE.exe windows:1 windows x86 arch:x86
a12cc6e47fbb7a82991fb634f9f9c966
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
CreateFileA
CreateFileMappingA
ExitProcess
GetFileSize
MapViewOfFile
SetEndOfFile
SetFilePointer
UnmapViewOfFile
CloseHandle
Sections
CODE Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
PEWRSEC.COM
-
SAMPLE.ASM
-
SAMPLE.EXE.exe windows:1 windows x86 arch:x86
98c88d882f01a3f6ac1e5f7dfd761624
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
ExitProcess
user32
MessageBoxA
Sections
CODE Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
_README_.TXT