Static task
static1
Behavioral task
behavioral1
Sample
SETUP-~1.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
SETUP-~1.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
TIBIA_~1.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
TIBIA_~1.exe
Resource
win10v2004-20240802-en
General
-
Target
1194efc2b15948c8fa7f06be1a3b6bf2_JaffaCakes118
-
Size
3.5MB
-
MD5
1194efc2b15948c8fa7f06be1a3b6bf2
-
SHA1
e3afdfea200bbf7ced0de286f96db3e003c1e619
-
SHA256
14553c2694a3822c6f560e259d193cbd49261a9a06f57f7bdc8af9c4cb971a83
-
SHA512
933ba0d83a77d45e1d781986b6c30e9a016d02c1838d0fcf3b91205513bfe3229d9e643c9426912001d97bbd2c190482d8d17210458915c60a3dbe2bd037c0f0
-
SSDEEP
98304:/VgqeOKGpWFkZQgUX2FZU2y5ZWgjpIxL9+7QtE7:/GqeRGgA3owUjKgjpIxL9CQ6
Malware Config
Signatures
-
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource unpack001/SETUP-~1.EXE unpack001/TIBIA_~1.EXE
Files
-
1194efc2b15948c8fa7f06be1a3b6bf2_JaffaCakes118.cab
-
SETUP-~1.EXE.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
TIBIA_~1.EXE.exe windows:4 windows x86 arch:x86
0e62a3caa45e0b46b09602728b623a70
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
kernel32
AddAtomA
CloseHandle
CopyFileA
CreateFileA
ExitProcess
FindAtomA
GetAtomNameA
GetCommandLineA
GetModuleFileNameA
GetModuleHandleA
GetStartupInfoA
GetVersionExA
OpenProcess
ReadFile
ReadProcessMemory
SetFilePointer
SetUnhandledExceptionFilter
Sleep
TerminateProcess
WriteFile
msvcrt
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
free
getenv
malloc
memcpy
memset
signal
sprintf
strcpy
shell32
ShellExecuteA
user32
FindWindowA
GetWindowThreadProcessId
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 368B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 800B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ