Static task
static1
Behavioral task
behavioral1
Sample
27cfd64991c158ea5caf70d9003405fb_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
27cfd64991c158ea5caf70d9003405fb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
27cfd64991c158ea5caf70d9003405fb_JaffaCakes118
-
Size
183KB
-
MD5
27cfd64991c158ea5caf70d9003405fb
-
SHA1
3da91eb51800c558855a031e14da710d22a37827
-
SHA256
9af2a1e234a41c9b7e065ec6c806847ba079c1916cb99fee93be264dae8d3b0d
-
SHA512
7a4b3574a8fdb8575226e219012e36b036f9ac8269f23576a2a25e96298c7eeec4382082ba528f87e20e72271573ffdc96626e565eec91e8edc773dcd97baec1
-
SSDEEP
1536:HxQB0l/WuxO8VxKUOO1di/Id3ZpcWI0l8WhZMBxztBJom4t:Hg0l/WsxvKUOO1scppcWbl8WcJoh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27cfd64991c158ea5caf70d9003405fb_JaffaCakes118
Files
-
27cfd64991c158ea5caf70d9003405fb_JaffaCakes118.exe windows:4 windows x86 arch:x86
5d0f3a0a69c9b44ba7aedd6aad0d0f22
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
MoveFileExA
CopyFileA
MoveFileA
lstrcatA
GetModuleFileNameA
LoadLibraryA
VirtualFreeEx
OpenProcess
GetCurrentProcessId
lstrcpyA
GetCommandLineA
FreeLibrary
GetModuleHandleA
IsBadReadPtr
CloseHandle
ReadFile
GetFileSize
CreateFileA
GetModuleHandleW
GetWindowsDirectoryA
Process32Next
lstrcmpiA
Process32First
VirtualQueryEx
ReadProcessMemory
GetThreadContext
GetCurrentDirectoryA
GetLastError
DuplicateHandle
GetCurrentProcess
GetStdHandle
TerminateProcess
WriteFile
ResumeThread
SetThreadContext
VirtualProtectEx
VirtualAllocEx
LoadLibraryW
GetProcAddress
CreateProcessA
GetVersion
ExitProcess
DebugBreak
InterlockedDecrement
OutputDebugStringA
InterlockedIncrement
IsBadWritePtr
HeapValidate
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
SetConsoleCtrlHandler
HeapAlloc
HeapReAlloc
VirtualAlloc
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
GetStringTypeA
GetStringTypeW
FlushFileBuffers
SetStdHandle
advapi32
GetUserNameA
CreateProcessAsUserA
OpenProcessToken
Sections
.text Size: 140KB - Virtual size: 140KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ