Static task
static1
Behavioral task
behavioral1
Sample
d338ddeabd3756997956e526f427c9bd_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d338ddeabd3756997956e526f427c9bd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d338ddeabd3756997956e526f427c9bd_JaffaCakes118
-
Size
369KB
-
MD5
d338ddeabd3756997956e526f427c9bd
-
SHA1
a08dda36e17d9a9d0ef70ca7dfa77a12126922bd
-
SHA256
2f7315e452354cc14c36e928ba9d09f2f9d5a304de4c764e0f02bbf60bbc4b6f
-
SHA512
f0679aa6f380260347541bd02a5afbf54b024a2b2c92a841b1d276d69bbe0b6f6186d40140ba9b2795851d8de6b540bad1c64ef76146a7fd595a9d15a046e36f
-
SSDEEP
6144:owZkKw5pLXX2MKPU+WNdSae1dyXBQ3ieLZXZQN/h+/pU3U8c2FB3DavNro5iHRoS:fZVwXLXmPASx1dyKieLZXiNpc+Iey/oM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d338ddeabd3756997956e526f427c9bd_JaffaCakes118
Files
-
d338ddeabd3756997956e526f427c9bd_JaffaCakes118.exe windows:4 windows x86 arch:x86
a5e2ac28e1031852b75f783c427641a9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msi
MsiCollectUserInfoW
MsiConfigureFeatureW
MsiDatabaseCommit
samlib
SamiEncryptPasswords
SamTestPrivateFunctionsUser
SamRemoveMultipleMembersFromAlias
SamConnectWithCreds
ntdll
NtDuplicateObject
RtlCreateTagHeap
DbgBreakPoint
LdrLoadDll
RtlInitializeCriticalSection
LdrUnloadDll
strstr
RtlCopyLuid
_snwprintf
RtlEqualSid
RtlFreeSid
RtlLeaveCriticalSection
NtSetInformationObject
NtNotifyChangeKey
NtCreateSemaphore
NtOpenProcess
NtClose
NtQueryDefaultLocale
RtlEnterCriticalSection
NtSetInformationProcess
wcscat
RtlInitializeCriticalSectionAndSpinCount
RtlCompareUnicodeString
NtOpenProcessToken
swprintf
NtQueryObject
RtlCreateSecurityDescriptor
RtlCreateUserThread
wcslen
NtQueryInformationToken
NtQueryValueKey
NtQueryInformationProcess
LdrGetDllHandle
NtCreateSection
NtOpenThread
NtMakePermanentObject
wcsncpy
NtOpenThreadToken
LdrGetProcedureAddress
RtlInitString
NtQuerySystemInformation
RtlCopyUnicodeString
RtlAnsiStringToUnicodeString
wcscpy
_wcsicmp
NtSetEvent
RtlOpenCurrentUser
NtQuerySymbolicLinkObject
NtMakeTemporaryObject
RtlCharToInteger
NtOpenKey
NtSetValueKey
DbgPrint
RtlEqualUnicodeString
RtlAppendUnicodeStringToString
RtlPrefixUnicodeString
NtTerminateThread
RtlUpcaseUnicodeChar
NtCreateEvent
RtlExpandEnvironmentStrings_U
_wcsnicmp
NtOpenSymbolicLinkObject
memmove
RtlQueryRegistryValues
NtCreateDirectoryObject
RtlCreateUnicodeString
NtCreateSymbolicLinkObject
RtlSetDaclSecurityDescriptor
NtResetEvent
RtlAllocateAndInitializeSid
user32
CallMsgFilterA
kernel32
VirtualAlloc
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 304KB - Virtual size: 304KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ