_gekelberifin@8
Static task
static1
Behavioral task
behavioral1
Sample
aefbc18d2b634990ab54da4310058d2f_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
aefbc18d2b634990ab54da4310058d2f_JaffaCakes118
-
Size
271KB
-
MD5
aefbc18d2b634990ab54da4310058d2f
-
SHA1
f572947ddf7fd8378b2bca1e3eb8716f5798664a
-
SHA256
4aaf32a9593e3fff90d2fc26e766549d044d89d8a473534c94c94925b1678dad
-
SHA512
314e7eed480827a3f9b35888a08ce2887f4ae6e6ff8722f5c67bbe093d715b6cb0bbab4d4ff1978a7ed362342d6f53a797671f51f1e6e024df7b09834b38146f
-
SSDEEP
3072:DM4NHbZSNmg3BdLk7bdpgUbcX0lYjG22F2IgO+f9o+Q2X45O:4KSmgxdLkHfVy0l8i7OLbb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource aefbc18d2b634990ab54da4310058d2f_JaffaCakes118
Files
-
aefbc18d2b634990ab54da4310058d2f_JaffaCakes118.exe windows:5 windows x86 arch:x86
280d1c1e81c1a4de56b5357cbb50f9a1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumResourceNamesW
OpenFile
lstrlenA
WritePrivateProfileStructA
TlsGetValue
CallNamedPipeA
ScrollConsoleScreenBufferW
CreateJobObjectW
OpenSemaphoreA
ConnectNamedPipe
FreeEnvironmentStringsA
_lclose
GetProcessPriorityBoost
CreateNamedPipeW
LocalFlags
ReadConsoleW
WriteFile
GetUserDefaultLangID
GetCommandLineA
SetCommTimeouts
FindResourceExA
GlobalAlloc
LoadLibraryW
Sleep
_hread
GetPrivateProfileStructW
GetVersionExW
DeleteVolumeMountPointW
SetConsoleMode
WriteConsoleW
FillConsoleOutputCharacterA
GetBinaryTypeW
SetThreadPriority
GlobalUnlock
DeactivateActCtx
InterlockedExchange
GlobalUnfix
GetLastError
IsDBCSLeadByteEx
GetTapeStatus
SetVolumeLabelW
EnterCriticalSection
SetFileApisToOEM
GetLocalTime
OpenMutexA
SetCalendarInfoW
SetCurrentDirectoryW
BeginUpdateResourceA
PostQueuedCompletionStatus
WriteProfileSectionW
AddAtomA
GetTapeParameters
WaitForMultipleObjects
GetModuleHandleA
LoadLibraryExA
VirtualProtect
EnumDateFormatsW
GetConsoleCursorInfo
lstrcpyA
lstrcatA
FileTimeToDosDateTime
InterlockedIncrement
InterlockedDecrement
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoA
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
SetHandleCount
GetStdHandle
GetFileType
HeapAlloc
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
GetModuleHandleW
GetProcAddress
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetLocaleInfoW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
CloseHandle
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
SetStdHandle
CreateFileA
user32
GetCursorPos
gdi32
GetBoundsRect
Exports
Exports
Sections
.text Size: 218KB - Virtual size: 217KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 91.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ