Static task
static1
Behavioral task
behavioral1
Sample
d0dcdd6e9cf3f2fab254360e95b0f665_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d0dcdd6e9cf3f2fab254360e95b0f665_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0dcdd6e9cf3f2fab254360e95b0f665_JaffaCakes118
-
Size
469KB
-
MD5
d0dcdd6e9cf3f2fab254360e95b0f665
-
SHA1
8c3e10c29b413e79a78175905b54b7523026a09b
-
SHA256
6999db43e8bf4c0ea8a8f9755c95c9795c6b64d7884a436201144cab5b25424d
-
SHA512
33bdcc1ac96b266e49cc81dd785fd029a98cc7984aeca38ff082a03fd847ecc14aa78987ae634a6531f7a15d9d430b1feb60f7695e4a51a2b9fd9c5d76002b51
-
SSDEEP
3072:N1YtpMhDCFii75jDjv6+rg57e0Z+PxiMYFBe3FKPI6q9U6h2fZ2dbtwlJw01VeLW:7Y34DO7jfiunYFq3hosd8JL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0dcdd6e9cf3f2fab254360e95b0f665_JaffaCakes118
Files
-
d0dcdd6e9cf3f2fab254360e95b0f665_JaffaCakes118.exe windows:5 windows x86 arch:x86
ba08b51fbc83b7e0b40a885fcdb3bcff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
GetModuleHandleA
FindResourceA
SizeofResource
LoadResource
LockResource
InterlockedDecrement
GetTempPathA
CopyFileA
GetTempFileNameA
FindFirstFileA
FindNextFileA
FindClose
CreateMutexA
CreateEventA
WaitForSingleObject
OpenMutexA
OpenEventA
SetEvent
GetModuleFileNameA
EnumResourceNamesA
DeleteFileA
Sleep
GetLastError
GetVersionExA
CloseHandle
GetCurrentProcess
RaiseException
CreateFileA
SetLastError
LocalFree
LocalAlloc
MoveFileExA
DeviceIoControl
EnterCriticalSection
FlushFileBuffers
CreateFileW
HeapReAlloc
WriteConsoleW
LoadLibraryW
LeaveCriticalSection
GetTickCount
QueryPerformanceCounter
DeleteCriticalSection
SetStdHandle
RtlUnwind
HeapSize
GetFileType
GetStringTypeW
GetConsoleMode
GetConsoleCP
SetFilePointer
HeapAlloc
HeapFree
GetSystemTimeAsFileTime
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EncodePointer
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
user32
ExitWindowsEx
advapi32
InitializeSecurityDescriptor
SetEntriesInAclA
AllocateAndInitializeSid
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
SetSecurityDescriptorDacl
shell32
ShellExecuteExA
ole32
CoCreateGuid
CoInitializeEx
CoInitializeSecurity
CoSetProxyBlanket
CoCreateInstance
oleaut32
SysFreeString
SysAllocString
rpcrt4
UuidToStringA
UuidFromStringA
shlwapi
PathFindFileNameA
PathQuoteSpacesA
PathCombineA
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 373KB - Virtual size: 373KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ