Static task
static1
Behavioral task
behavioral1
Sample
e27c18b9890865b7f623cc5b4cf2504b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e27c18b9890865b7f623cc5b4cf2504b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e27c18b9890865b7f623cc5b4cf2504b_JaffaCakes118
-
Size
104KB
-
MD5
e27c18b9890865b7f623cc5b4cf2504b
-
SHA1
c2c433770e11db18016c7b54601c69ac6657bdf4
-
SHA256
714d3e179c6935a44a97f35a7fdf794c0ca7a7aa161d140be338f6f7c5804b77
-
SHA512
4244af4fede8ace12676da47a59310aa42215463f13e11dae0637e0537e945841473a4e6ab6af710108e9206845d4e9c50e239795b7a827e5f424a8e74d3840d
-
SSDEEP
1536:/2PVJ2K352P+FFQuC18winP3QTMAqkelvkTGxvB6ijkph4tIo8LmHFMxsY:/aVUKdKxiYulvrvzQpqtIo8L2M+Y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e27c18b9890865b7f623cc5b4cf2504b_JaffaCakes118
Files
-
e27c18b9890865b7f623cc5b4cf2504b_JaffaCakes118.exe windows:4 windows x86 arch:x86
8174e7aa6908ae776c8579cf18954db3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
OpenProcessToken
CreateProcessAsUserA
AdjustTokenPrivileges
GetTokenInformation
SetServiceStatus
RegisterServiceCtrlHandlerExA
CloseServiceHandle
StartServiceA
CreateServiceA
OpenSCManagerA
RegSetValueExA
RegCloseKey
RegCreateKeyA
RegQueryValueExA
GetCurrentHwProfileA
StartServiceCtrlDispatcherA
LookupPrivilegeValueA
kernel32
lstrlenW
lstrcmp
InterlockedIncrement
InterlockedDecrement
GetCurrentThread
GetModuleFileNameA
GetSystemDirectoryA
lstrcat
CopyFileA
LeaveCriticalSection
WaitForSingleObject
SetEvent
DuplicateHandle
CreateEventA
CloseHandle
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSection
GetUserGeoID
DeleteCriticalSection
lstrlen
GetGeoInfoA
Sleep
InterlockedExchange
EnterCriticalSection
GetVersionExA
lstrcmpiW
GetLastError
SetUnhandledExceptionFilter
GetCommandLineW
LocalFree
WriteConsoleW
GetCurrentProcess
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LoadLibraryA
HeapSize
RtlUnwind
GetConsoleMode
GetConsoleCP
FlushFileBuffers
CreateFileA
SetFilePointer
HeapFree
HeapAlloc
ExitThread
GetCurrentThreadId
CreateThread
GetExitCodeProcess
GetCommandLineA
GetProcessHeap
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
RaiseException
GetProcAddress
GetModuleHandleA
ExitProcess
WriteFile
GetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
RestoreLastError
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
LockResource
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
shell32
SHGetSpecialFolderPathA
CommandLineToArgvW
user32
MessageBoxA
winhttp
WinHttpReceiveResponse
WinHttpQueryDataAvailable
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpSetOption
WinHttpOpen
WinHttpQueryOption
WinHttpConnect
WinHttpReadData
WinHttpQueryHeaders
WinHttpSendRequest
ws2_32
WSAStartup
wtsapi32
WTSQueryUserToken
WTSFreeMemory
WTSEnumerateSessionsA
urlmon
URLDownloadToFileA
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mackt Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE