Static task
static1
Behavioral task
behavioral1
Sample
56e15243af0b329bd1de8a7364f051cb_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
56e15243af0b329bd1de8a7364f051cb_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
56e15243af0b329bd1de8a7364f051cb_JaffaCakes118
-
Size
66KB
-
MD5
56e15243af0b329bd1de8a7364f051cb
-
SHA1
e85886265dd0e018cf26528ca050d8bee7a66659
-
SHA256
153615f40a94f2d2484910b0ac12f8bbf8d9912cd2a64f9c8bc85b32aa3fc5a6
-
SHA512
604ba5e0e9eb1736c2b5b1e05de09b3efd607e00bd2eac2ce0ea8b4a4081a64e20d3b8ade9a828d056893d8f0ff02a7c295e40d90b2564d820badd32b2c9cea1
-
SSDEEP
1536:mSQ/f6cSMa9K3/pYBKhAs2JSeoWAR/XHPisR0dfXwd:mSQFSM1RYBKhAs2JSeE3asRCQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 56e15243af0b329bd1de8a7364f051cb_JaffaCakes118
Files
-
56e15243af0b329bd1de8a7364f051cb_JaffaCakes118.exe windows:4 windows x86 arch:x86
2facc447db58db980427034ff1982e20
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DisableThreadLibraryCalls
EnumResourceLanguagesA
ExitProcess
FlushFileBuffers
GetACP
GetCommandLineA
GetModuleHandleA
GetOEMCP
GetStartupInfoA
HeapAlloc
LeaveCriticalSection
LoadResource
OpenFile
SetCurrentDirectoryA
SetEndOfFile
SetLastError
SetUnhandledExceptionFilter
VirtualAlloc
VirtualFree
WriteFile
lstrcatA
lstrcpyA
lstrcpynA
lstrlenA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
ntdll
NtQuerySymbolicLinkObject
NtQueryValueKey
NtSetValueKey
NtUnmapViewOfSection
NtWriteVirtualMemory
RtlAllocateAndInitializeSid
RtlAnsiStringToUnicodeString
RtlCharToInteger
RtlCopyLuid
RtlCopyUnicodeString
RtlCreateSecurityDescriptor
RtlCreateTagHeap
RtlCreateUnicodeString
RtlCreateUserThread
RtlEqualSid
RtlExpandEnvironmentStrings_U
RtlFreeUnicodeString
RtlInitializeCriticalSectionAndSpinCount
RtlLeaveCriticalSection
RtlNtStatusToDosError
RtlPrefixUnicodeString
RtlSetDaclSecurityDescriptor
NtQueryObject
RtlUpcaseUnicodeChar
strstr
swprintf
wcscat
wcscpy
wcslen
NtCreateEvent
NtCreateSection
NtCreateSymbolicLinkObject
NtDuplicateObject
NtMakeTemporaryObject
NtMapViewOfSection
NtNotifyChangeKey
NtOpenKey
NtQueryDefaultLocale
NtQueryInformationProcess
RtlUnlockHeap
rpcrt4
RpcBindingSetAuthInfoExA
RpcBindingSetObject
RpcEpRegisterA
RpcBindingSetAuthInfoA
RpcMgmtEnableIdleCleanup
RpcMgmtEpEltInqNextA
RpcMgmtInqIfIds
RpcMgmtInqStats
RpcMgmtSetAuthorizationFn
RpcNetworkInqProtseqsA
RpcProtseqVectorFreeA
RpcServerInqBindings
RpcServerRegisterAuthInfoA
RpcServerRegisterIfEx
RpcServerUseAllProtseqsEx
RpcServerUseProtseqEpExA
RpcServerUseProtseqExA
RpcSmClientFree
RpcSmEnableAllocate
RpcSsAllocate
RpcSsDestroyClientContext
RpcSsDisableAllocate
RpcSsFree
UuidCreate
UuidCreateSequential
UuidToStringA
data_into_ndr
double_array_from_ndr
long_from_ndr_temp
short_array_from_ndr
short_from_ndr_temp
tree_peek_ndr
RpcBindingServerFromClient
RpcBindingInqOption
RpcBindingInqObject
MesInqProcEncodingId
MesHandleFree
MesEncodeDynBufferHandleCreate
MesDecodeIncrementalHandleCreate
MIDL_wchar_strcpy
IUnknown_QueryInterface_Proxy
CStdStubBuffer_QueryInterface
RpcEpUnregister
crtdll
wcschr
strcmp
setbuf
memchr
isleadbyte
fsetpos
_wcsicoll
_sopen
_mbctombb
_getdllprocaddr
_exit
_execve
_chdrive
_beep
Sections
.text Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ