Linear
Static task
static1
Behavioral task
behavioral1
Sample
a5c463db805e356cb6e73e5676b397eab265e061c6797e27b626b8b4aee892a3.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_5af391be90cda339cdd429d328f31292dd1018dd6817da3a5d989c2641a7050b
-
Size
607KB
-
MD5
13f6d764ef7691bb2fdf4bc9b0213f4e
-
SHA1
3458a8f8757273d5f52b98cb67d559bedfa3a6e4
-
SHA256
5af391be90cda339cdd429d328f31292dd1018dd6817da3a5d989c2641a7050b
-
SHA512
271daca72e3c9986cdd5119a474905556eebd68163f22b7aa0309d00344ac754d575f23ad406d5d77323e642985162229f16bffd0c6fdd45ac69a7b4987b92e2
-
SSDEEP
12288:7q1DJzKtnDmfFX9lPezta8z2k/eAcaAPXtGex1HdRol4JWexg+4gi:7qxJz+nDy/kVcaCtGEHdqlFvIi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a5c463db805e356cb6e73e5676b397eab265e061c6797e27b626b8b4aee892a3.exe
Files
-
JaffaCakes118_5af391be90cda339cdd429d328f31292dd1018dd6817da3a5d989c2641a7050b.zip
Password: infected
-
a5c463db805e356cb6e73e5676b397eab265e061c6797e27b626b8b4aee892a3.exe.exe windows:5 windows x86 arch:x86
7c7468077fdc0ac19fd97bae9e84d6b6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
SystemTimeToTzSpecificLocalTime
InterlockedIncrement
SetMailslotInfo
ScrollConsoleScreenBufferW
InitializeSListHead
HeapFree
GetModuleHandleExW
CancelWaitableTimer
GetTimeFormatA
LockFile
ConnectNamedPipe
FreeEnvironmentStringsA
WriteFile
TzSpecificLocalTimeToSystemTime
GlobalAlloc
GetSystemTimeAdjustment
HeapDestroy
GetFileAttributesA
GetConsoleAliasW
TerminateProcess
GetAtomNameW
IsDBCSLeadByte
GetModuleFileNameW
WriteConsoleOutputCharacterA
ReplaceFileA
GlobalUnlock
LCMapStringA
CreateDirectoryA
GetLastError
GetProcAddress
GetProcessHeaps
SetFileAttributesA
PrepareTape
LoadLibraryA
UnhandledExceptionFilter
SetConsoleOutputCP
VirtualLock
FindAtomA
GetTapeParameters
GlobalWire
GetModuleHandleA
GetCurrentDirectoryA
SetProcessShutdownParameters
FileTimeToLocalFileTime
DeleteTimerQueueTimer
CompareStringW
CompareStringA
WriteConsoleW
SetEndOfFile
SetLocalTime
GetLocaleInfoA
EnumDateFormatsExW
FindNextVolumeMountPointW
HeapCompact
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
HeapAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
EnterCriticalSection
LeaveCriticalSection
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
CreateFileA
InitializeCriticalSectionAndSpinCount
HeapSize
SetConsoleCtrlHandler
InterlockedExchange
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
GetProcessHeap
ReadFile
GetLocaleInfoW
GetTimeZoneInformation
WriteConsoleA
GetConsoleOutputCP
SetEnvironmentVariableA
user32
GetProcessDefaultLayout
GetDesktopWindow
advapi32
AbortSystemShutdownA
AddAccessDeniedAce
EqualSid
CopySid
BackupEventLogW
Exports
Exports
Sections
.text Size: 653KB - Virtual size: 652KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vay Size: 512B - Virtual size: 377B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ