Static task
static1
Behavioral task
behavioral1
Sample
B14299FD4D1CBFB4CC7486D978398214.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
B14299FD4D1CBFB4CC7486D978398214.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
D214C717A357FE3A455610B197C390AA.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
D214C717A357FE3A455610B197C390AA.exe
Resource
win10v2004-20240802-en
General
-
Target
fd7445210bc60baeeab77f69e1ba51b8_JaffaCakes118
-
Size
909KB
-
MD5
fd7445210bc60baeeab77f69e1ba51b8
-
SHA1
4b9e7fc3db2344d703df880761a3cda9c756978c
-
SHA256
a9f23dea34e3d3f8a84c513f950a53bd2c117640b202b0c65c7677d425ca02ec
-
SHA512
ef403120d50c3270d75c6dfe9f7bfc0dd56208e7bce015238367745ac302569b5f151bbfc2d6c0c2104f91eb8e782d87c234fb1e656aa046e3a9ff7927fc8245
-
SSDEEP
24576:vKEvvuu+Df3yeMnPjjQ2GrBMurR6+uDKaNRlxa63:yEuu+DfihjRurRqDKSrR3
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/B14299FD4D1CBFB4CC7486D978398214 unpack001/D214C717A357FE3A455610B197C390AA
Files
-
fd7445210bc60baeeab77f69e1ba51b8_JaffaCakes118.zip
Password: infected
-
B14299FD4D1CBFB4CC7486D978398214.exe windows:5 windows x86 arch:x86
da9452a2aec343eaa7f76987d3524568
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
netapi32
NetApiBufferFree
NetApiBufferAllocate
NetRemoteTOD
NetScheduleJobDel
ws2_32
WSAStartup
inet_ntoa
gethostbyname
gethostname
WSACleanup
kernel32
LocalAlloc
GetLastError
MoveFileExW
DeleteFileW
GetProcAddress
GetModuleHandleW
WriteFile
CreateFileW
SizeofResource
LockResource
LoadResource
FindResourceW
GetCommandLineW
GetFileTime
GetWindowsDirectoryW
Sleep
CreateThread
CreateProcessW
CopyFileW
MoveFileW
ReadFile
GetSystemTime
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
InitializeCriticalSection
GetStringTypeW
IsValidCodePage
LocalFree
VirtualAlloc
VirtualFree
GetCurrentProcess
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CloseHandle
GetTickCount
HeapReAlloc
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetStdHandle
GetProcessHeap
CreateFileA
SetEndOfFile
SetFileTime
GetOEMCP
GetACP
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
RaiseException
RtlUnwind
HeapFree
ExitProcess
HeapSetInformation
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
HeapAlloc
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
LoadLibraryW
GetLocaleInfoW
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
LoadImageW
advapi32
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
RegQueryValueExW
OpenSCManagerW
OpenServiceW
QueryServiceConfigW
ChangeServiceConfigW
CloseServiceHandle
CreateServiceW
ChangeServiceConfig2W
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
StartServiceW
shell32
CommandLineToArgvW
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 841KB - Virtual size: 841KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
D214C717A357FE3A455610B197C390AA.exe windows:5 windows x86 arch:x86
da9452a2aec343eaa7f76987d3524568
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
netapi32
NetApiBufferFree
NetApiBufferAllocate
NetRemoteTOD
NetScheduleJobDel
ws2_32
WSAStartup
inet_ntoa
gethostbyname
gethostname
WSACleanup
kernel32
LocalAlloc
GetLastError
MoveFileExW
DeleteFileW
GetProcAddress
GetModuleHandleW
WriteFile
CreateFileW
SizeofResource
LockResource
LoadResource
FindResourceW
GetCommandLineW
GetFileTime
GetWindowsDirectoryW
Sleep
CreateThread
CreateProcessW
CopyFileW
MoveFileW
ReadFile
GetSystemTime
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
WaitForSingleObject
InitializeCriticalSection
GetStringTypeW
IsValidCodePage
LocalFree
VirtualAlloc
VirtualFree
GetCurrentProcess
OpenProcess
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
CloseHandle
GetTickCount
HeapReAlloc
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
WriteConsoleW
SetStdHandle
GetProcessHeap
CreateFileA
SetEndOfFile
SetFileTime
GetOEMCP
GetACP
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
RaiseException
RtlUnwind
HeapFree
ExitProcess
HeapSetInformation
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
HeapAlloc
IsProcessorFeaturePresent
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
LoadLibraryW
GetLocaleInfoW
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
user32
LoadImageW
advapi32
StartServiceCtrlDispatcherW
RegisterServiceCtrlHandlerW
SetServiceStatus
RegQueryValueExW
OpenSCManagerW
OpenServiceW
QueryServiceConfigW
ChangeServiceConfigW
CloseServiceHandle
CreateServiceW
ChangeServiceConfig2W
RegOpenKeyExW
RegDeleteValueW
RegCloseKey
StartServiceW
shell32
CommandLineToArgvW
Sections
.text Size: 82KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 841KB - Virtual size: 841KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ