Static task
static1
Behavioral task
behavioral1
Sample
dbec679b1755c90f956ba31cfc5e63f7_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbec679b1755c90f956ba31cfc5e63f7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dbec679b1755c90f956ba31cfc5e63f7_JaffaCakes118
-
Size
36KB
-
MD5
dbec679b1755c90f956ba31cfc5e63f7
-
SHA1
f2c83822fe972cefac8a539fe4ee68d5e787f2ef
-
SHA256
b6f7bd0bf5c21a2579bc36f483906f7cc02984249ad47a6461ebc6ac9bc8890b
-
SHA512
325a4bcd344b51b19ef0b0dc236d17246ed9baca840e360fb3e1b29a78696f29dddc7ee50f899991f19ec76f54e00c8446481e955255f55b8f8812ef50476a61
-
SSDEEP
768:JbrO4ZnrZkWH6wSWbd6yoE0FToFFBIqntTRU:JnO4xzTxoE0R4BJTR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dbec679b1755c90f956ba31cfc5e63f7_JaffaCakes118
Files
-
dbec679b1755c90f956ba31cfc5e63f7_JaffaCakes118.exe windows:4 windows x86 arch:x86
5d533bb65b59fb6ab422051bac5f26f3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
CreateProcessA
CreatePipe
GlobalFree
GlobalAlloc
GetModuleHandleW
UnmapViewOfFile
lstrcmpA
MapViewOfFile
CreateFileMappingA
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
VirtualFreeEx
lstrcmpiA
PeekNamedPipe
CreateFileW
WinExec
OpenMutexA
SetFilePointer
GetModuleFileNameA
SleepEx
GetTickCount
CreateProcessW
DeleteFileW
TerminateProcess
ResumeThread
CreateThread
GetLocalTime
DeleteFileA
CopyFileA
CreateMutexA
GetStartupInfoA
lstrcpyW
lstrcatW
lstrcmpW
GetLogicalDrives
GetDriveTypeW
FindFirstFileW
FindNextFileW
FindClose
FileTimeToLocalFileTime
FileTimeToSystemTime
GetComputerNameA
GetSystemDefaultLangID
GetVersionExW
GetSystemDirectoryA
lstrcatA
lstrlenA
WriteFile
ReadFile
lstrcpyA
GetVersion
CreateFileA
LoadLibraryA
Sleep
lstrlenW
MultiByteToWideChar
GetModuleHandleA
GetProcAddress
GetCurrentProcess
GetCurrentThreadId
LocalFree
GetLastError
OpenProcess
GetFileSize
CloseHandle
user32
GetThreadDesktop
SetProcessWindowStation
CloseWindowStation
GetProcessWindowStation
CloseDesktop
GetUserObjectSecurity
SetUserObjectSecurity
wsprintfW
wsprintfA
SetThreadDesktop
advapi32
CloseServiceHandle
OpenServiceA
CreateProcessAsUserA
DuplicateTokenEx
ImpersonateLoggedOnUser
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
GetTokenInformation
AllocateLocallyUniqueId
SetTokenInformation
GetSecurityDescriptorDacl
BuildExplicitAccessWithNameA
SetEntriesInAclA
MakeAbsoluteSD
SetSecurityDescriptorDacl
IsValidSecurityDescriptor
LookupAccountNameA
OpenSCManagerW
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
SetServiceStatus
DeleteService
LookupPrivilegeValueW
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
CreateServiceA
msvcrt
_adjust_fdiv
_stricmp
__p__commode
__p__fmode
__set_app_type
_controlfp
__setusermatherr
printf
memset
malloc
memcpy
free
wcslen
strstr
_except_handler3
sprintf
strlen
wcsstr
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
ws2_32
gethostbyname
WSACleanup
WSAStartup
inet_ntoa
netapi32
NetApiBufferFree
NetUserGetLocalGroups
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
Sections
.text Size: 24KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ