Static task
static1
Behavioral task
behavioral1
Sample
85b750a8f9a40334b856936001eb8a397571da5653bd7e28e524a7ed3136bbb7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
85b750a8f9a40334b856936001eb8a397571da5653bd7e28e524a7ed3136bbb7.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_a837f80b517b3ab38a8875d184c6b2c0c2ba52e99d57491b8ea81b01f420a91f
-
Size
769KB
-
MD5
239bbfc54eb18915a85b1a7a79c1e94f
-
SHA1
88038e2bcaca45c8a42cd3975dc11a5d4fd5315f
-
SHA256
a837f80b517b3ab38a8875d184c6b2c0c2ba52e99d57491b8ea81b01f420a91f
-
SHA512
2ce6d3c613e3aaca712b247f8abc1f0c71d4ab818146d9415c2a9696ba27fc0eae862d5a092fc112acb95d04ced16396c4ccb10424b1099851fa1cf5a10288bb
-
SSDEEP
12288:pyVuGSc2XrpGb93cN+Kk+OpGbO9nzaAylQ1lOJUdQYxU4WuTpzQsunvl111Rqa:clKVGb9cN+VJu6DU0pzQsyvd1RX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/85b750a8f9a40334b856936001eb8a397571da5653bd7e28e524a7ed3136bbb7
Files
-
JaffaCakes118_a837f80b517b3ab38a8875d184c6b2c0c2ba52e99d57491b8ea81b01f420a91f.zip
Password: infected
-
85b750a8f9a40334b856936001eb8a397571da5653bd7e28e524a7ed3136bbb7.exe windows:6 windows x86 arch:x86
93a138801d9601e4c36e6274c8b9d111
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
WriteFile
WriteConsoleW
WaitForMultipleObjects
WaitForSingleObject
VirtualQuery
VirtualFree
VirtualAlloc
SwitchToThread
SuspendThread
SetWaitableTimer
SetUnhandledExceptionFilter
SetProcessPriorityBoost
SetEvent
SetErrorMode
SetConsoleCtrlHandler
ResumeThread
QueryFullProcessImageNameA
ProcessIdToSessionId
PostQueuedCompletionStatus
OpenProcess
LoadLibraryA
LoadLibraryW
SetThreadContext
GetThreadContext
GetSystemInfo
GetSystemDirectoryA
GetStdHandle
GetQueuedCompletionStatusEx
GetProcessAffinityMask
GetProcAddress
GetEnvironmentStringsW
GetConsoleMode
FreeEnvironmentStringsW
ExitProcess
DuplicateHandle
CreateThread
CreateIoCompletionPort
CreateEventA
CloseHandle
AddVectoredExceptionHandler
Sections
.text Size: 374KB - Virtual size: 374KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 409KB - Virtual size: 409KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
/4 Size: 512B - Virtual size: 281B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/19 Size: 82KB - Virtual size: 81KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/32 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/46 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/63 Size: 10KB - Virtual size: 10KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/80 Size: 512B - Virtual size: 42B
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/99 Size: 143KB - Virtual size: 143KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/112 Size: 67KB - Virtual size: 67KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/124 Size: 24KB - Virtual size: 23KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 1020B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.symtab Size: 73KB - Virtual size: 72KB
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ