Static task
static1
Behavioral task
behavioral1
Sample
17fc5d3c8000200647e077751be827b9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17fc5d3c8000200647e077751be827b9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
17fc5d3c8000200647e077751be827b9_JaffaCakes118
-
Size
828KB
-
MD5
17fc5d3c8000200647e077751be827b9
-
SHA1
7b609302cbe05439b2f983f680305b350e2ac7fc
-
SHA256
72c4794a898e6ed0c746a9e8ee1b04da1b5ccbc34f3fc0f35ee630d3348f226e
-
SHA512
63e82886fc43cf9f9bfed0d2bdbd71b12585bf8dd1ab6e6cac25250b8d308caf9b8077205df2bdfb4dd46b2f847cf8a9072c6b994a6b62f0e2b2c99db9496c6e
-
SSDEEP
24576:oGR7cBl4IQT5btmJdm5e3dCkb/IwBiH3qTsjXXl2Zj:oGN/IQTNtmJwo3Um/IenYjXXI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17fc5d3c8000200647e077751be827b9_JaffaCakes118
Files
-
17fc5d3c8000200647e077751be827b9_JaffaCakes118.exe windows:5 windows x86 arch:x86
f4b6cf0ca55540f41387f4c980e4d026
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
secur32
CredMarshalTargetInfo
InitSecurityInterfaceW
FreeContextBuffer
SaslGetProfilePackageA
AddSecurityPackageA
SaslEnumerateProfilesA
FreeCredentialsHandle
QuerySecurityPackageInfoW
TranslateNameA
AcquireCredentialsHandleW
GetComputerObjectNameW
QuerySecurityContextToken
LsaConnectUntrusted
ImportSecurityContextA
SaslIdentifyPackageW
UnsealMessage
LsaGetLogonSessionData
LsaCallAuthenticationPackage
InitializeSecurityContextW
QueryContextAttributesA
SecpFreeMemory
LsaDeregisterLogonProcess
EnumerateSecurityPackagesA
InitializeSecurityContextA
shlwapi
SHSetValueW
PathGetCharTypeW
StrCpyNW
StrSpnW
StrCSpnIA
PathIsPrefixW
PathIsNetworkPathA
wvnsprintfA
AssocQueryStringByKeyA
StrFromTimeIntervalW
SHRegDuplicateHKey
PathFindFileNameW
PathStripToRootA
PathIsUNCServerW
StrFormatKBSizeA
PathQuoteSpacesA
PathIsRootA
PathUnmakeSystemFolderA
SHOpenRegStream2W
DelayLoadFailureHook
kernel32
GetOverlappedResult
GetCurrentThread
FormatMessageW
GetSystemWindowsDirectoryA
LoadLibraryW
GetPrivateProfileIntA
ReplaceFile
GetBinaryTypeW
Module32Next
RestoreLastError
lstrcpy
OpenEventA
SetClientTimeZoneInformation
BaseCheckAppcompatCache
HeapAlloc
GetLocaleInfoW
GetModuleHandleW
CommConfigDialogW
QueryPerformanceCounter
LocalFileTimeToFileTime
GetPrivateProfileSectionA
ntdll
_CIsqrt
RtlPinAtomInAtomTable
NtVdmControl
NtAllocateUuids
LdrGetProcedureAddress
NtRequestWaitReplyPort
ZwQueryKey
ZwDeleteKey
ZwDeleteFile
ZwSetInformationProcess
ZwQueryInformationJobObject
NtQueryFullAttributesFile
ZwReplyWaitReceivePort
RtlAllocateHeap
RtlCustomCPToUnicodeN
wcsstr
RtlAcquireResourceExclusive
sscanf
ZwImpersonateClientOfPort
RtlCopyString
RtlxAnsiStringToUnicodeSize
NtLockVirtualMemory
RtlCharToInteger
RtlInterlockedPopEntrySList
rsaenh
CPGetHashParam
CPImportKey
CPHashSessionKey
CPEncrypt
CPGetProvParam
CPSetKeyParam
CPGenRandom
CPGetUserKey
CPAcquireContext
CPHashData
CPGenKey
DllRegisterServer
oleaut32
VarI2FromI8
VarI4FromStr
VarSub
VarBstrFromDisp
VarCyInt
VarUI1FromR4
VarR4FromDisp
VariantInit
VarOr
LPSAFEARRAY_UserMarshal
SafeArrayGetLBound
VarI4FromUI8
SafeArrayCreateVector
VarI2FromUI8
VarUI8FromR4
OleCreatePropertyFrame
VarCyFromI8
Sections
.text Size: 375KB - Virtual size: 375KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 189KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 980B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ