Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd
-
Size
363KB
-
MD5
0078fc3f4e4901195bfc323e4bcf2d59
-
SHA1
96de6dc9fd911a3d340287ceb66afd7e25eff8c0
-
SHA256
2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd
-
SHA512
13a80eb11043f653ca2d6c1cc2e544c77ecf0d002dee1c198cb70ef60d1fac033c305ae5fc38068f1cf922c7ce59bd8125ae75637d68b8d5dc62e65bb2086bdc
-
SSDEEP
6144:27smY4rQrDXbNwp83CTH8V/gctENEhKhl:27RrQ/bOjb8V/LEgK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd
Files
-
JaffaCakes118_2b6efbf39ea8d700b591827d0d2eaf27f29af6c4fec4f9f3f9da5ec8ec56aacd.exe windows:5 windows x86 arch:x86
bcc72a924b908e9a13e070d8decf7d90
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
GetConsoleAliasExesLengthA
FreeLibrary
SystemTimeToTzSpecificLocalTime
InitializeSListHead
HeapFree
GlobalLock
SetHandleInformation
CancelWaitableTimer
LockFile
ConnectNamedPipe
FreeEnvironmentStringsA
GetTickCount
FindNextVolumeMountPointA
TzSpecificLocalTimeToSystemTime
GlobalAlloc
GetSystemPowerStatus
SetSystemTimeAdjustment
GetFileAttributesA
HeapCreate
GetTimeFormatW
GetConsoleAliasW
HeapValidate
TerminateProcess
GetAtomNameW
GetMailslotInfo
ReadFile
GetLocaleInfoA
CreateJobObjectA
LCMapStringA
GetConsoleOutputCP
CreateDirectoryA
IsDBCSLeadByteEx
GetCurrentDirectoryW
GetProcAddress
EnumDateFormatsExA
HeapUnlock
SetFileAttributesA
PrepareTape
GetProcessVersion
GetLocalTime
LoadLibraryA
UnhandledExceptionFilter
FindAtomA
GetTapeParameters
GetModuleFileNameA
GetModuleHandleA
GetProcessShutdownParameters
ScrollConsoleScreenBufferA
LocalFileTimeToFileTime
CompareStringW
CompareStringA
WriteConsoleW
WriteConsoleA
GetTimeZoneInformation
VirtualUnlock
RemoveVectoredExceptionHandler
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
Sleep
HeapSize
ExitProcess
EnterCriticalSection
LeaveCriticalSection
WriteFile
GetStdHandle
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapDestroy
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetConsoleCtrlHandler
InterlockedExchange
InitializeCriticalSectionAndSpinCount
CloseHandle
CreateFileA
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringW
GetLocaleInfoW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
SetFilePointer
GetProcessHeap
SetEnvironmentVariableA
user32
GetDesktopWindow
GetProcessDefaultLayout
GetClassLongA
GetProcessWindowStation
advapi32
GetLengthSid
Sections
.text Size: 297KB - Virtual size: 297KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 41KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ