Static task
static1
Behavioral task
behavioral1
Sample
01d4beae74d12b26ea171eb9420a566a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
01d4beae74d12b26ea171eb9420a566a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
01d4beae74d12b26ea171eb9420a566a_JaffaCakes118
-
Size
68KB
-
MD5
01d4beae74d12b26ea171eb9420a566a
-
SHA1
95896f06f70c660920545dce7a873721b0dc12d6
-
SHA256
06ba8c2690663b28bba3cdb0062fe01940bb66fb41bbcfd9217b9cce2917e924
-
SHA512
6b125f91ee1acaf2aaaa549c0b51aa02dd924330844bc8f21207f997d2d05d67a98e93016f2c56baf2de949a9e484b59115424e56217db48a8deeecafe86a4fc
-
SSDEEP
768:VJBEHZxoNUvn2ZIR0Yb/RmbaSC7IJeo1YP/mXjcwLaNPceGYQ8orxXKCC6FQ9:VTE5SDZY0Yb/obZ0o1YPO4kaRorN8yK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01d4beae74d12b26ea171eb9420a566a_JaffaCakes118
Files
-
01d4beae74d12b26ea171eb9420a566a_JaffaCakes118.exe windows:4 windows x86 arch:x86
903d3c29eae4070716ec232db0c6545e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDrives
GetSystemDirectoryA
GetCurrentProcessId
GetTickCount
WaitForSingleObject
CreateProcessA
TerminateProcess
GetExitCodeProcess
ReadFile
FindClose
FindNextFileA
FindFirstFileA
GetVersionExA
GlobalMemoryStatus
Beep
GetLogicalDriveStringsA
GetDriveTypeA
GetLocalTime
Process32Next
Process32First
CreateToolhelp32Snapshot
GetLastError
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
VirtualFreeEx
OpenProcess
GetModuleHandleA
SetStdHandle
LoadLibraryA
GetProcAddress
GetVolumeInformationA
GetPrivateProfileStringA
GetFileSize
DeleteFileA
SetFilePointer
CreateFileA
WriteFile
CloseHandle
GetVersion
GetCurrentProcess
CopyFileA
ExitProcess
GetCurrentThreadId
GetModuleFileNameA
GetWindowsDirectoryA
WinExec
Sleep
SetFileAttributesA
CreateThread
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetStartupInfoA
GetCommandLineA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
FlushFileBuffers
user32
PostThreadMessageA
ExitWindowsEx
advapi32
RegisterServiceCtrlHandlerA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ChangeServiceConfigA
ControlService
DeleteService
OpenServiceA
SetServiceStatus
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
StartServiceA
StartServiceCtrlDispatcherA
ws2_32
bind
listen
accept
WSASocketA
setsockopt
sendto
gethostname
htons
closesocket
gethostbyname
connect
inet_ntoa
send
recv
WSACleanup
socket
WSAStartup
inet_addr
shlwapi
PathFileExistsA
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE