Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2
-
Size
362KB
-
MD5
96b76902694e418b9bd8c476a7e2a9d3
-
SHA1
fe4d12ed4eaaa9342e4cef187eed31eccdb1dff5
-
SHA256
19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2
-
SHA512
240942f9a13d02eca16bfb26a1697ab0649dd5b6fea19060bc9ed77917a04f88cc2fccc00dce91d97b90f60742397f3ac776294244feb9cb839de3159ac2f084
-
SSDEEP
6144:cTsmF4rQrDXbjzuFzkEEIvoZh2uPsKjAYT2ThKMlU:cTcrQ/bjzuSEQh2uPsK7wKz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2
Files
-
JaffaCakes118_19887a926c9d9b24362f4b68442e1ed89db9f4a8e46e97f2d640b38cb772d9a2.exe windows:5 windows x86 arch:x86
bcc72a924b908e9a13e070d8decf7d90
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
GetConsoleAliasExesLengthA
FreeLibrary
SystemTimeToTzSpecificLocalTime
InitializeSListHead
HeapFree
GlobalLock
SetHandleInformation
CancelWaitableTimer
LockFile
ConnectNamedPipe
FreeEnvironmentStringsA
GetTickCount
FindNextVolumeMountPointA
TzSpecificLocalTimeToSystemTime
GlobalAlloc
GetSystemPowerStatus
SetSystemTimeAdjustment
GetFileAttributesA
HeapCreate
GetTimeFormatW
GetConsoleAliasW
HeapValidate
TerminateProcess
GetAtomNameW
GetMailslotInfo
ReadFile
GetLocaleInfoA
CreateJobObjectA
LCMapStringA
GetConsoleOutputCP
CreateDirectoryA
IsDBCSLeadByteEx
GetCurrentDirectoryW
GetProcAddress
EnumDateFormatsExA
HeapUnlock
SetFileAttributesA
PrepareTape
GetProcessVersion
GetLocalTime
LoadLibraryA
UnhandledExceptionFilter
FindAtomA
GetTapeParameters
GetModuleFileNameA
GetModuleHandleA
GetProcessShutdownParameters
ScrollConsoleScreenBufferA
LocalFileTimeToFileTime
CompareStringW
CompareStringA
WriteConsoleW
WriteConsoleA
GetTimeZoneInformation
VirtualUnlock
RemoveVectoredExceptionHandler
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
Sleep
HeapSize
ExitProcess
EnterCriticalSection
LeaveCriticalSection
WriteFile
GetStdHandle
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetConsoleCtrlHandler
InterlockedExchange
InitializeCriticalSectionAndSpinCount
CloseHandle
CreateFileA
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringW
GetLocaleInfoW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
SetFilePointer
GetProcessHeap
SetEnvironmentVariableA
user32
GetDesktopWindow
GetProcessDefaultLayout
GetClassLongA
GetProcessWindowStation
advapi32
GetLengthSid
Sections
.text Size: 296KB - Virtual size: 296KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ