Static task
static1
Behavioral task
behavioral1
Sample
00277a5c08eb6e849b1874deea145d8c_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
00277a5c08eb6e849b1874deea145d8c_JaffaCakes118
-
Size
336KB
-
MD5
00277a5c08eb6e849b1874deea145d8c
-
SHA1
1cf76c29b62ad4f45ce29fe62519d26655ec8290
-
SHA256
d34835fbfa5a69151087ee1a3d8d609c2eab56039b9d9a7fe074b207f465d9f0
-
SHA512
096430c24593af335fbd54c8f6bf5db01d864bc6c64a71c74290384d12611da52aeb29ff89e34266fdee9b251277f0d34827c8a8592e13680d046787ee6d08d1
-
SSDEEP
3072:RTFLqm2YRh6TSYP0/qHtp4bM+Amn9qpCEXxGwAVF7ZMUQxwf10pXnYjN:RTF+2Rh6T3PUWpFrpUrfgX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00277a5c08eb6e849b1874deea145d8c_JaffaCakes118
Files
-
00277a5c08eb6e849b1874deea145d8c_JaffaCakes118.exe windows:4 windows x86 arch:x86
0977cf6ed6fc3389b62b80e4b243871c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareStringW
Sleep
SetNamedPipeHandleState
DuplicateHandle
CreatePipe
SetFilePointer
CreateFileA
GetExitCodeProcess
ReadFile
FlushFileBuffers
WriteFile
LocalFree
LocalAlloc
GetCurrentThread
GetProcAddress
GetModuleHandleA
GetUserDefaultLangID
GetModuleFileNameA
GetWindowsDirectoryA
GetSystemDirectoryA
CompareStringA
FreeLibrary
LoadLibraryW
GetCurrentProcess
GetStartupInfoA
CreateProcessA
WaitForSingleObject
CloseHandle
GetCommandLineA
FindResourceExA
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
GetLastError
InterlockedExchange
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
SetEndOfFile
LoadLibraryA
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetTimeZoneInformation
LCMapStringW
LCMapStringA
GetStdHandle
SetHandleCount
GetCPInfo
GetOEMCP
SetUnhandledExceptionFilter
TerminateProcess
IsBadWritePtr
GetACP
GetCurrentProcessId
VirtualFree
HeapCreate
ExitProcess
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
GetFileType
SetStdHandle
RtlUnwind
VirtualQuery
EnterCriticalSection
LeaveCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
VirtualProtect
VirtualAlloc
GetSystemInfo
SetEnvironmentVariableA
advapi32
ImpersonateSelf
RegCloseKey
RegOpenKeyExA
RegEnumKeyA
RegQueryValueExW
OpenThreadToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
FreeSid
RevertToSelf
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyA
RegQueryValueExA
user32
SendMessageA
CreateDialogParamA
ShowWindow
IsDialogMessageA
TranslateMessage
DispatchMessageA
PeekMessageA
MsgWaitForMultipleObjects
GetDlgItem
DestroyWindow
SetDlgItemTextA
GetDesktopWindow
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
PostQuitMessage
MessageBoxA
ExitWindowsEx
comctl32
ord17
Sections
.text Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 264KB - Virtual size: 264KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE