IsPsecxxv
Static task
static1
Behavioral task
behavioral1
Sample
13d293251552064a5096fce067dae009_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
13d293251552064a5096fce067dae009_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
13d293251552064a5096fce067dae009_JaffaCakes118
-
Size
96KB
-
MD5
13d293251552064a5096fce067dae009
-
SHA1
55f36a14d836b52cc2a96286a3fa93b4e883e4af
-
SHA256
e2c82ed80349d883e2cd9a66c7c601f7ccbcbd590779ad9021a69311f4f8118c
-
SHA512
20d0014470055885916dd1f4dca8c98b4641335c72f43bbd46c4aee205a2ca2cbf2d620d602bf43ade8f0bd6e39b7e5249ebe18a498ab5cf58f02eb5482091d1
-
SSDEEP
1536:pVTRAS6xJV/Pke2VPxdfEJ4+oPgkHdBZN+DFVnN+R4292pC:pVNASwXPKLEo7F8m4a6C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 13d293251552064a5096fce067dae009_JaffaCakes118
Files
-
13d293251552064a5096fce067dae009_JaffaCakes118.exe windows:4 windows x86 arch:x86
f230fcb753528e98a109f8e1d716dd0c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
GlobalUnlock
GetCommandLineA
GetStartupInfoA
ExitProcess
ntdll
_fltused
NtQueryQuotaInformationFile
RtlAddCompoundAce
wcscmp
RtlIntegerToChar
NtReadRequestData
ZwQueryInformationProcess
RtlResetRtlTranslations
RtlQueueWorkItem
ZwOpenDirectoryObject
ZwSetTimer
RtlOemStringToUnicodeString
RtlGetAce
RtlSetCurrentDirectory_U
LdrLoadAlternateResourceModule
NtCallbackReturn
ZwCreateDirectoryObject
NtTerminateProcess
Exports
Exports
Sections
.ldata Size: 4KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
_PAGELK Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ