Static task
static1
Behavioral task
behavioral1
Sample
f5878124004b994cdde8423d8674df93_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f5878124004b994cdde8423d8674df93_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f5878124004b994cdde8423d8674df93_JaffaCakes118
-
Size
264KB
-
MD5
f5878124004b994cdde8423d8674df93
-
SHA1
3cd3294f7af6a9723c307ee39baff2f95edd41f1
-
SHA256
ebfd982d8d77d8db56ebd4009cb163ee7f9db9e749cf4c189768d21fd382f461
-
SHA512
aaaa2c11597c6b0aa58e273a9d700c8ca3d2bf1715b36200056232172d1780e0a1a62ea38abe2c51dba9b4159a71f7d71525d40c1750ac379afb59331ec08f94
-
SSDEEP
6144:NkWSScfUV7fNv2IJgX6uCbT4BAHaTwlWSJm2voQBv1AMd:SWSS6UV7fNODqzb06HazSY25Bv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f5878124004b994cdde8423d8674df93_JaffaCakes118
Files
-
f5878124004b994cdde8423d8674df93_JaffaCakes118.exe windows:4 windows x86 arch:x86
3b9ca14c802b3f224558329863e29c15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LeaveCriticalSection
LockResource
HeapFree
HeapAlloc
GetProcessHeap
EnterCriticalSection
GetThreadLocale
GetSystemTimeAsFileTime
FindResourceA
HeapReAlloc
SetUnhandledExceptionFilter
lstrlenA
IsDebuggerPresent
SizeofResource
GetCurrentThreadId
CreateDirectoryA
WideCharToMultiByte
UnhandledExceptionFilter
GetACP
DeleteCriticalSection
HeapDestroy
LoadResource
FindResourceExA
lstrlenW
HeapSize
RaiseException
GetCurrentDirectoryA
VirtualAllocEx
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
user32
UnregisterClassA
CharLowerBuffA
query
BindIFilterFromStream
LoadTextFilter
CITextToSelectTreeEx
CollectFILTERPerformanceData
kerberos
SpUserModeInitialize
KerbCreateTokenFromTicket
KerbKdcCallBack
Sections
.UnITCD Size: 2KB - Virtual size: 27KB
IMAGE_SCN_MEM_READ
.text Size: 21KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dRPlrxv Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vUxpfF Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iGXiZR Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.svhpxLH Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.PwhQsl Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 207KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.LRDeiBT Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.StEoy Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.woiE Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.uHoK Size: 512B - Virtual size: 490B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iCpOii Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE