Static task
static1
Behavioral task
behavioral1
Sample
c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
c788365d5348b71e201c0c15372cc039_JaffaCakes118
-
Size
2.2MB
-
MD5
c788365d5348b71e201c0c15372cc039
-
SHA1
34de196d6a7160d1baf00c0f6112681fb136a0a3
-
SHA256
276bc7736bd40f07ecfbaa1cc399fb4a7f64fc0b1f27691b1041d498c8787bf1
-
SHA512
c51db053d4ba6ef643d2c63240d7b8614ac9c95c10a9a9518a2b823ce9e1e0d0a9c7c81a0267bd05f2ed9dd3ba113f33e3ccb306448f0715a30fa03866cf3000
-
SSDEEP
49152:jfQnt1Fz5mzc1vvKRNXQ8rcQLqBg6jqJRT7r7lsotbgJST4xfseS19N:zQnLRbKRNXvcQLqgAon
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c788365d5348b71e201c0c15372cc039_JaffaCakes118
Files
-
c788365d5348b71e201c0c15372cc039_JaffaCakes118.exe windows:6 windows x86 arch:x86
5a3ffe2b694ff66c40396de468b981aa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
VerSetConditionMask
VerifyVersionInfoW
lstrcmpiW
LoadLibraryW
UnregisterWaitEx
QueryDepthSList
InterlockedPopEntrySList
VirtualFree
lstrlenA
GetProcessId
GetCurrentProcess
GetCommandLineW
FreeLibrary
GetModuleFileNameA
GetComputerNameA
CreateThread
OpenSemaphoreA
LocalAlloc
WaitForSingleObject
CreateMutexA
WideCharToMultiByte
MultiByteToWideChar
CreateEventA
SetEvent
GetCurrentProcessId
GetProcAddress
LoadLibraryA
CreateDirectoryA
FindClose
FindNextFileA
FindFirstFileA
GetLastError
CopyFileA
LoadResource
CloseHandle
Process32Next
DeleteFileA
LockResource
GetFileAttributesA
Sleep
CreateToolhelp32Snapshot
GetModuleHandleA
FindResourceA
WTSGetActiveConsoleSessionId
VirtualProtect
VirtualAlloc
GetVersionExW
GetThreadTimes
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
TerminateProcess
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
EncodePointer
DecodePointer
CompareStringW
LCMapStringW
GetLocaleInfoW
GetStringTypeW
GetVersionExA
LCMapStringA
GetUserDefaultLCID
GetStringTypeExA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
GetCurrentThreadId
InitializeSListHead
GetStdHandle
GetFileType
WriteFile
GlobalMemoryStatus
FlushConsoleInputBuffer
ReleaseSemaphore
InitializeCriticalSection
CreateSemaphoreW
RtlUnwind
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
LoadLibraryExW
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetModuleHandleExW
GetModuleFileNameW
SetConsoleCtrlHandler
ReadFile
GetConsoleCP
ExitThread
FreeLibraryAndExitThread
GetCurrentThread
HeapAlloc
FlushFileBuffers
GetConsoleMode
HeapFree
GetCurrentDirectoryW
GetFullPathNameW
GetDateFormatW
GetTimeFormatW
IsValidLocale
EnumSystemLocalesW
SetStdHandle
ReadConsoleW
SetFilePointerEx
DeleteFileW
HeapReAlloc
GetTimeZoneInformation
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetConsoleMode
ReadConsoleInputW
MoveFileExW
HeapSize
WriteConsoleW
SetEndOfFile
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SetThreadPriority
SignalObjectAndWait
CreateTimerQueue
CreateFileA
QueryFullProcessImageNameA
GetTempPathA
GetCommandLineA
GetCPInfo
lstrcatA
Process32First
DeleteCriticalSection
SizeofResource
TryEnterCriticalSection
DuplicateHandle
GetExitCodeThread
user32
LoadStringA
GetProcessWindowStation
SetTimer
GetUserObjectInformationW
TranslateMessage
DispatchMessageA
MessageBoxA
GetMessageA
advapi32
ReportEventA
DeregisterEventSource
RegisterEventSourceA
AdjustTokenPrivileges
CreateProcessAsUserA
RegCloseKey
StartServiceCtrlDispatcherA
SetTokenInformation
LookupPrivilegeValueA
GetUserNameA
OpenProcessToken
DuplicateTokenEx
GetTokenInformation
CloseServiceHandle
SetServiceStatus
RegisterServiceCtrlHandlerA
OpenSCManagerA
OpenServiceA
SetSecurityDescriptorDacl
ConvertSidToStringSidA
LookupAccountNameA
InitializeSecurityDescriptor
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
RegGetValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegDeleteValueA
shell32
ShellExecuteExA
CommandLineToArgvW
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
wtsapi32
WTSQueryUserToken
userenv
CreateEnvironmentBlock
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 360KB - Virtual size: 359KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 450KB - Virtual size: 450KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ