__GetExceptDLLinfo
Static task
static1
Behavioral task
behavioral1
Sample
afe55725d4164ed7e4d01002be6e9f1d_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afe55725d4164ed7e4d01002be6e9f1d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
afe55725d4164ed7e4d01002be6e9f1d_JaffaCakes118
-
Size
24KB
-
MD5
afe55725d4164ed7e4d01002be6e9f1d
-
SHA1
6f0410d9cc1b0ca99dbfaef2f2400477c0b67826
-
SHA256
a066430b5ca909835cc934e90274ab180bec43579179f7be457bd211d3f77c4a
-
SHA512
5baf68beacc13db09e62f69daa7d80e650053b55f0d93c78c19a87e310f2f063bc8e27dd686adf4987f1bf453e1bc8294de1fa268f30cc7db88423ac066d03aa
-
SSDEEP
384:1b8XXr79WerVG+xzipJLDi7KGrFrr45Rhz5GOusA5KDyrMAeKDjhU:1yr79T7WLrGZGRhM7/rPU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource afe55725d4164ed7e4d01002be6e9f1d_JaffaCakes118
Files
-
afe55725d4164ed7e4d01002be6e9f1d_JaffaCakes118.exe windows:1 windows x86 arch:x86
e3702f1b93d1956a5b66914f2492ea37
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
GetProcAddress
GetProcessHeap
GetCurrentThreadId
GetModuleHandleA
LocalFree
GetCommandLineA
GetLastError
GetEnvironmentStrings
GetCurrentProcess
GetCurrentDirectoryW
SetEvent
LockResource
HeapAlloc
FindResourceA
WaitForSingleObject
GetModuleFileNameW
GetComputerNameW
FormatMessageA
CallNamedPipeA
ExitProcess
CreateFileW
CloseHandle
Sleep
SetLastError
ReadFile
MultiByteToWideChar
LoadResource
HeapFree
LoadLibraryA
user32
GetUserObjectInformationA
GetProcessWindowStation
CloseDesktop
CloseWindowStation
GetUserObjectSecurity
GetThreadDesktop
SetProcessWindowStation
wsprintfW
SetUserObjectSecurity
wsprintfA
OpenWindowStationA
OpenDesktopA
MessageBoxA
shell32
ShellExecuteExA
advapi32
InitializeAcl
ImpersonateNamedPipeClient
GetAce
SetSecurityDescriptorDacl
RevertToSelf
ImpersonateLoggedOnUser
RegQueryValueExA
RegOpenKeyExA
GetUserNameW
CreateProcessAsUserW
AdjustTokenPrivileges
RegCloseKey
QueryServiceStatus
GetTokenInformation
OpenServiceA
OpenSCManagerA
GetSecurityDescriptorDacl
CopySid
OpenProcessToken
LookupPrivilegeValueA
GetLengthSid
LogonUserW
InitializeSecurityDescriptor
GetAclInformation
CloseServiceHandle
AddAce
AddAccessAllowedAce
Exports
Exports
Sections
CODE Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ