Static task
static1
Behavioral task
behavioral1
Sample
fd6461ab3e39b3e5a9cd0529c2498051_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd6461ab3e39b3e5a9cd0529c2498051_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fd6461ab3e39b3e5a9cd0529c2498051_JaffaCakes118
-
Size
432KB
-
MD5
fd6461ab3e39b3e5a9cd0529c2498051
-
SHA1
0792ea3c05cb5c2540b87e67e031ae879b09e27e
-
SHA256
fa76273e2b18d3221c69fe0b8ca19bd3f61e54fb579d4847fc62a431290eb859
-
SHA512
a091c0558731052f6cb72e245d9a88f2758ce17b5c2b35f3557f67e427085a16f358d42c8d11120afadc68497ca5d37dc0bc95c364884c9c9423912ff394d5f2
-
SSDEEP
12288:GAbrTbeE0dfYbDRi378PkBOpQIGuu55tM2d:dbgYb1i378P+OuIa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fd6461ab3e39b3e5a9cd0529c2498051_JaffaCakes118
Files
-
fd6461ab3e39b3e5a9cd0529c2498051_JaffaCakes118.exe windows:5 windows x86 arch:x86
c59e99217f1a939c445b3df019b8bfd7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
_strcmpi
NtQueryInformationProcess
RtlTryEnterCriticalSection
RtlInitUnicodeString
NtOpenFile
NtCreateSection
NtMapViewOfSection
NtAllocateVirtualMemory
RtlAdjustPrivilege
NtQuerySystemInformation
NtDuplicateObject
NtQueryObject
NtWriteVirtualMemory
sscanf
NtFreeVirtualMemory
_chkstk
_snprintf
_vsnprintf
strncmp
_strlwr
memset
memcpy
NtUnmapViewOfSection
NtClose
NtQueryInformationFile
NtTerminateThread
strstr
kernel32
ExitProcess
IsBadWritePtr
LoadResource
SizeofResource
CreateProcessA
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetExitCodeThread
ExitThread
ResumeThread
Sleep
FlushInstructionCache
VirtualQueryEx
VirtualAllocEx
GetTempFileNameA
InitializeCriticalSection
SetLastError
VirtualProtectEx
WriteProcessMemory
CreateMutexA
GetCurrentProcessId
OpenProcess
CloseHandle
CreateThread
HeapAlloc
GetProcessHeap
HeapFree
HeapValidate
FindClose
FindNextFileA
DeleteFileA
RemoveDirectoryA
MoveFileExA
FindFirstFileA
QueryDosDeviceA
GetLogicalDriveStringsA
WriteFile
SetFilePointer
GetFileSize
SetFileAttributesW
GetFileAttributesW
ReadFile
WideCharToMultiByte
MultiByteToWideChar
HeapReAlloc
IsBadReadPtr
OutputDebugStringA
GetCurrentThreadId
GetLastError
GetProcAddress
LoadLibraryA
LeaveCriticalSection
EnterCriticalSection
GetEnvironmentVariableA
SetEnvironmentVariableA
SuspendThread
SetThreadPriority
WaitForSingleObject
UnmapViewOfFile
MapViewOfFile
GetSystemInfo
CreateFileMappingA
CreateFileA
GetModuleFileNameA
advapi32
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
Sections
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 281KB - Virtual size: 283KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 125KB - Virtual size: 125KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ