Static task
static1
Behavioral task
behavioral1
Sample
a9129_3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a9129_3.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5e27f39a0756956388446b4db3188efe
-
Size
39KB
-
MD5
5e27f39a0756956388446b4db3188efe
-
SHA1
e7b0870f3183f3c4bb24623df1dab2f017fbbff1
-
SHA256
fc15d25eeb4dcec4c5841521ca0b180cd55d6f193a48beefc20368b96e09e12a
-
SHA512
347719196293198a16cb5dc8047a6fe0584a4f2b5b0b52ae19795de0017b99b0592a19e8a78c75adf0b1c96e8ab5a166e0e9f01b32f20bb23bad4370b8919074
-
SSDEEP
768:X9Tghi/JiRR6kKoRN+x+I+nOeq21902ENd4YpmWU3ItHcdC/snRgQa3681XMR1BB:X9T9RivXKhoI+hFEHpp43SACknRmXMRd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a9129_3.EXE
Files
-
JaffaCakes118_5e27f39a0756956388446b4db3188efe.rar
-
a9129_3.EXE.exe windows:5 windows x86 arch:x86
d02399ec9d93dec72005c5428ccce527
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
TerminateProcess
IsDebuggerPresent
UnhandledExceptionFilter
LoadLibraryW
EnterCriticalSection
RtlUnwind
LeaveCriticalSection
HeapSize
Sleep
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
HeapReAlloc
LCMapStringW
MultiByteToWideChar
GetStringTypeW
IsProcessorFeaturePresent
LocalFree
CloseHandle
LocalAlloc
GetLastError
lstrlenW
HeapCreate
GetProcessHeap
HeapFree
GetCurrentProcess
HeapAlloc
TlsSetValue
TlsGetValue
TlsAlloc
DeleteCriticalSection
GetFileType
InitializeCriticalSectionAndSpinCount
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
RaiseException
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
VirtualQuery
user32
RegisterClassA
MoveWindow
DestroyWindow
GetMessageA
SetTimer
ScreenToClient
GetWindowRect
PostQuitMessage
SendDlgItemMessageA
LoadBitmapA
GetParent
LoadIconA
GetWindowInfo
GetClientRect
GetUserObjectSecurity
SetFocus
SendMessageA
GetDC
IsDialogMessageA
TranslateMessage
MessageBoxA
InvalidateRect
UnregisterClassA
GetWindowLongA
GetWindowTextW
SetUserObjectSecurity
CreateWindowExA
ReleaseDC
GetDlgItem
GetDesktopWindow
SetWindowPos
DispatchMessageA
MessageBoxW
GetSystemMetrics
CloseWindow
LoadCursorA
SetDlgItemTextA
gdi32
LineTo
GetDCBrushColor
SelectObject
Ellipse
GetObjectA
GetStockObject
MoveToEx
advapi32
GetLengthSid
AddAce
AddAccessAllowedAce
InitializeAcl
GetAce
LookupPrivilegeValueA
SetSecurityDescriptorDacl
PrivilegeCheck
InitializeSecurityDescriptor
GetAclInformation
OpenProcessToken
GetSecurityDescriptorDacl
mpr
WNetOpenEnumA
WNetEnumResourceA
ws2_32
WSAStartup
WSACleanup
Sections
.text Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ