Static task
static1
Behavioral task
behavioral1
Sample
c206992f7c6836ec6a227a6e29ae7609_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c206992f7c6836ec6a227a6e29ae7609_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c206992f7c6836ec6a227a6e29ae7609_JaffaCakes118
-
Size
576KB
-
MD5
c206992f7c6836ec6a227a6e29ae7609
-
SHA1
7b36e8408c5fe1fb8faa57b66219e71985e397c6
-
SHA256
f18a6d3cf01c2f0d46fb23df3ed1e49c7e185b2796f8d54e184a6ea168da0bbd
-
SHA512
0d9caa87cc85a0c35d3ae3e290ba4e98bfb1b00c700d891698e40062af1e7218bccabb1fde21a1f50b8d3277ea30b613b187389ce42e4260161826f3573832e2
-
SSDEEP
12288:DdJcGnssH4U3vt1p3REJXqYu5eGmJmtnCiMk0ZydbEySo:DdJcGnssYuvt1juXXsuo1CzZydSo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c206992f7c6836ec6a227a6e29ae7609_JaffaCakes118
Files
-
c206992f7c6836ec6a227a6e29ae7609_JaffaCakes118.exe windows:5 windows x64 arch:x64
48e28d1a984d6b5a99349353710a92d3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WriteFile
SetEndOfFile
CreateToolhelp32Snapshot
VirtualAllocEx
GetProcAddress
GetModuleHandleW
GetCurrentProcess
CreateRemoteThread
LoadLibraryA
VirtualFreeEx
WaitForSingleObject
SetLastError
CloseHandle
ReadProcessMemory
OpenProcess
GetLastError
Process32FirstW
Process32NextW
FlushFileBuffers
GetModuleFileNameA
DeleteFileA
GetTempPathA
GetTempFileNameA
CreateFileA
SetFileAttributesA
GetModuleFileNameW
SetFileAttributesW
ReadFile
SetFilePointer
GetModuleHandleA
CreateFileW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
GetCurrentThreadId
FlsAlloc
Sleep
ExitProcess
GetStdHandle
RtlUnwindEx
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapSetInformation
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
LeaveCriticalSection
EnterCriticalSection
HeapFree
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
HeapAlloc
HeapReAlloc
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
advapi32
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
shell32
ShellExecuteA
Sections
.text Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 520KB - Virtual size: 528KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ