Static task
static1
Behavioral task
behavioral1
Sample
3a62432b2441703f5708c03fd49a5c4d_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3a62432b2441703f5708c03fd49a5c4d_JaffaCakes118
-
Size
821KB
-
MD5
3a62432b2441703f5708c03fd49a5c4d
-
SHA1
b49f28fed7c2e7254736857c84b6b090c501ba04
-
SHA256
bbfbf5aabeae313e2a710526504241f8314db9d95f8e82c6413dabf814866105
-
SHA512
786e5615cc163af393f3378788bf5044159e6f5bc708cc2273ae5a7104ee11ce1dfe760e9fa8516981e889f8ec6b7518f9736c923289473f14a2c83d0a1f32ef
-
SSDEEP
12288:YWpNT/K1rE3nEbPvpMUQuvQ9uV1qhzecoks8Gyb3wxFpKBrNXIIt2jiVGAxuTI2I:1rrYrUEXLGuVee6s8GTx6JXV+0uMZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3a62432b2441703f5708c03fd49a5c4d_JaffaCakes118
Files
-
3a62432b2441703f5708c03fd49a5c4d_JaffaCakes118.exe windows:4 windows x86 arch:x86
15c5492320c7a9149688a04bda10eb0a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
netapi32
NetGroupGetUsers
NetServerGetInfo
NetpwNameValidate
DsGetSiteNameW
NetUserChangePassword
NetFileClose
NetFileGetInfo
NetGroupSetInfo
NetServerDiskEnum
NetStatisticsGet
NetUserAdd
NetWkstaTransportEnum
NetUnjoinDomain
NetUseAdd
DsEnumerateDomainTrustsW
NetLocalGroupAdd
tapi32
lineShutdown
lineInitialize
lineInitializeExA
lineMakeCallA
lineGetCallInfoA
lineInitializeExW
lineGetCountryW
lineDeallocateCall
lineGetCallStatus
lineGetDevCapsA
lineSetStatusMessages
lineNegotiateAPIVersion
lineNegotiateExtVersion
lineGetAddressCapsA
lineAccept
ulib
??0ARGUMENT_LEXEMIZER@@QAE@XZ
?QueryDriveType@SYSTEM@@SG?AW4DRIVE_TYPE@@PBVWSTRING@@@Z
?GetStandardInput@PROGRAM@@UAEPAVSTREAM@@XZ
?IsGuidVolName@PATH@@QAEEXZ
?Initialize@STRING_ARGUMENT@@QAEEPAD@Z
?QueryString@WSTRING@@QBEPAV1@KK@Z
??0STRING_ARGUMENT@@QAE@XZ
??0CLASS_DESCRIPTOR@@QAE@XZ
?SetBit@BITVECTOR@@QAEXKK@Z
?QueryFile@SYSTEM@@SGPAVFSN_FILE@@PBVPATH@@EPAE@Z
?QueryChAt@WSTRING@@QBEGK@Z
?Initialize@REST_OF_LINE_ARGUMENT@@QAEEXZ
??0PROGRAM@@IAE@XZ
?Initialize@MACHINE@@QAEEXZ
kernel32
CreateEventA
Module32First
MapViewOfFileEx
VirtualAlloc
GetVolumePathNameW
ExpandEnvironmentStringsW
_hwrite
GetModuleHandleA
EnumSystemLocalesW
GetCurrentProcess
GetHandleInformation
GetModuleHandleW
GetTempFileNameA
MapUserPhysicalPages
DeleteFileA
SetCurrentDirectoryA
SetHandleInformation
LocalShrink
EnumLanguageGroupLocalesW
GetCommConfig
CloseProfileUserMapping
advapi32
SetTokenInformation
GetUserNameW
SetFileSecurityA
InitializeAcl
InitializeSecurityDescriptor
GetSidIdentifierAuthority
RegOpenKeyW
ConvertStringSecurityDescriptorToSecurityDescriptorA
MakeAbsoluteSD
SetKernelObjectSecurity
SetSecurityDescriptorControl
Sections
.text Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.nep Size: 179KB - Virtual size: 289KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 193KB - Virtual size: 299KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 207KB - Virtual size: 332KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 214KB - Virtual size: 321KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 578B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ