Static task
static1
Behavioral task
behavioral1
Sample
01a96136592df372fb1d9e6055a3f270_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
01a96136592df372fb1d9e6055a3f270_JaffaCakes118
-
Size
176KB
-
MD5
01a96136592df372fb1d9e6055a3f270
-
SHA1
9497e9350127c66f480c889a55da5219c4127c4d
-
SHA256
1899643962a2962b8be04bda7946f54ea1e782d3c383ebdbef0c9351ad45d81e
-
SHA512
13c13a409fd62f9be8b0e83e635a6ea233c314d1df7ceaaa0d348994bb880c525a6160c8167b142e59dea8921b0227aa5b68f58f8763be64060cf732f0ab3a63
-
SSDEEP
3072:ggZ+uBVmARoF3Ta4gPIXi+o4NeIKTWhCpmviCzlkUx:fVmPa4eai+XeVTWhCpmviCOUx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01a96136592df372fb1d9e6055a3f270_JaffaCakes118
Files
-
01a96136592df372fb1d9e6055a3f270_JaffaCakes118.exe windows:4 windows x86 arch:x86
904c306ce0f104f327958fc8d5140df4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetLogicalDrives
GetCurrentProcessId
GetTickCount
WaitForSingleObject
CreateProcessA
TerminateProcess
GetExitCodeProcess
ReadFile
FindClose
FindNextFileA
FindFirstFileA
GetVersionExA
GlobalMemoryStatus
Beep
GetLogicalDriveStringsA
GetVolumeInformationA
GetLocalTime
Process32Next
Process32First
CreateToolhelp32Snapshot
GetLastError
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
VirtualFreeEx
OpenProcess
GetModuleHandleA
SetStdHandle
LoadLibraryA
GetProcAddress
GetSystemDirectoryA
GetPrivateProfileStringA
GetFileSize
DeleteFileA
SetFilePointer
CreateFileA
WriteFile
CloseHandle
GetVersion
GetCurrentProcess
CopyFileA
ExitProcess
GetCurrentThreadId
GetModuleFileNameA
GetWindowsDirectoryA
WinExec
Sleep
SetFileAttributesA
CreateThread
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetStartupInfoA
GetCommandLineA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
FlushFileBuffers
user32
PostThreadMessageA
ExitWindowsEx
advapi32
RegisterServiceCtrlHandlerA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ChangeServiceConfigA
ControlService
DeleteService
OpenServiceA
SetServiceStatus
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
StartServiceA
StartServiceCtrlDispatcherA
ws2_32
bind
listen
accept
WSASocketA
setsockopt
sendto
gethostname
htons
closesocket
gethostbyname
connect
inet_ntoa
send
recv
WSACleanup
socket
WSAStartup
inet_addr
shlwapi
PathFileExistsA
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
aourayh Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xizswvc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ekyheyi Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE