Static task
static1
Behavioral task
behavioral1
Sample
07f8dd6b19bc0f491af9bb8d345d9117_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07f8dd6b19bc0f491af9bb8d345d9117_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
07f8dd6b19bc0f491af9bb8d345d9117_JaffaCakes118
-
Size
56KB
-
MD5
07f8dd6b19bc0f491af9bb8d345d9117
-
SHA1
5561c2ba454a0294dde87ae709b406723a9cf0b5
-
SHA256
f6c72f008ed67360a6adcfe6097350117ba9d2b05c8fc20d11ec557f905dbbae
-
SHA512
7b740a5063f810c88b556b05303ea7a2e7993ce0c7dca412c9a845f8b4588dce6c6f4a0523cc80347962b9049534752585c6acf29e389ca1c0144238461eebed
-
SSDEEP
768:iYkzL4erBzOqg9UM9y6A1b09rOhPqycnZZUKkpXyRov60E9tn:iYkAkaq4AvPsUKkI+CPtn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07f8dd6b19bc0f491af9bb8d345d9117_JaffaCakes118
Files
-
07f8dd6b19bc0f491af9bb8d345d9117_JaffaCakes118.exe windows:4 windows x86 arch:x86
b5399533b26cf880fa525badf6a52d90
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
lsremora
SetAccessPriv
kernel32
LoadLibraryA
VirtualFreeEx
CloseHandle
GetExitCodeThread
WaitForSingleObject
GetProcAddress
WriteProcessMemory
GetLastError
VirtualAllocEx
GetModuleFileNameA
OpenProcess
FreeLibrary
CreateRemoteThread
GetCurrentThreadId
GetCommandLineA
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
InitializeCriticalSection
RtlUnwind
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
FlushFileBuffers
advapi32
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE