Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_627ad629e3c59974b9fcbd3aeb5c6421.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_627ad629e3c59974b9fcbd3aeb5c6421.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_627ad629e3c59974b9fcbd3aeb5c6421
-
Size
252KB
-
MD5
627ad629e3c59974b9fcbd3aeb5c6421
-
SHA1
c296cfaf02fb66a55ebaaf6052727c44d44ffe1b
-
SHA256
1212d393637c210f131ccb4d645e2ba328f2fdd7bdefef2152e92448724def4d
-
SHA512
6e9c1d981a3a167ec879f114b42c9ac36d000e4433decf4bc00982583d694d39d925777703796dc131f0d7777ad7d7be09c04a341ef5994638ece7b4b5e8c6a3
-
SSDEEP
6144:Wg9SJ3GmB+gw8quOMdwD5xTse7P+BMbA5QwEgNV0gShqlHfl:zSJWmMB6OM6VxAeD+qbA5LEgNKhCHfl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_627ad629e3c59974b9fcbd3aeb5c6421
Files
-
JaffaCakes118_627ad629e3c59974b9fcbd3aeb5c6421.exe windows:4 windows x86 arch:x86
d9e532bee60319c34dd4f051b70ae406
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htons
inet_addr
gethostname
gethostbyname
iphlpapi
GetBestInterface
GetIpAddrTable
kernel32
GetProcessHeap
TlsAlloc
InitializeCriticalSection
WaitForSingleObject
lstrcpyW
lstrlenW
GetLastError
CreateEventW
CreateMutexW
GetCurrentProcessId
FreeLibrary
GlobalAlloc
LoadLibraryW
ExpandEnvironmentStringsW
SetEvent
GetModuleHandleW
GetVersionExW
GetModuleFileNameW
ExitProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
GetCurrentThreadId
FatalAppExitA
HeapCreate
Sleep
GetFileAttributesW
GetModuleFileNameA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetCurrentThread
GetModuleHandleA
GetStartupInfoA
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
LoadLibraryA
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetUserDefaultLCID
GetLocaleInfoA
IsValidLocale
GetLocaleInfoW
GetVersion
GetProcAddress
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
netapi32
NetReplGetInfo
NetUseGetInfo
user32
CharNextA
GetMenuStringA
SetWindowTextA
WaitMessage
CreateDialogParamA
DialogBoxIndirectParamW
GetCapture
CreatePopupMenu
LoadBitmapA
CharNextW
SetFocus
SendMessageW
GetActiveWindow
CharLowerA
CreateWindowExW
InsertMenuItemA
GetKeyboardLayout
IsMenu
SetCursor
GetMenuItemInfoA
RegisterWindowMessageA
CharUpperW
LoadMenuA
SetCapture
CopyIcon
LoadMenuIndirectA
EmptyClipboard
SetDlgItemInt
CreateWindowExA
SetForegroundWindow
ShowWindow
DefWindowProcW
GetMenu
GetWindowRgn
TrackPopupMenu
PostQuitMessage
GetCursorPos
gdi32
GetStockObject
RemoveFontResourceW
CreateBitmap
DeleteObject
CreateFontW
CreateDIBPatternBrushPt
CreateScalableFontResourceW
Sections
.edata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aaIrfj Size: 104KB - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.E Size: 110KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ