Static task
static1
Behavioral task
behavioral1
Sample
e2b6214570ada177d9bf9e6a6acc3920_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e2b6214570ada177d9bf9e6a6acc3920_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e2b6214570ada177d9bf9e6a6acc3920_JaffaCakes118
-
Size
176KB
-
MD5
e2b6214570ada177d9bf9e6a6acc3920
-
SHA1
bf6d083afc3c9cc72e0b7f096acfa5b43eb97e1f
-
SHA256
4de66ccbd50818c2d2958eb671a95c3812cef9215fe20e51bb1d779581df0d03
-
SHA512
27941bd898ac4bf036f383f96e1123dab47d97024fd9eddcb9bf4a108dd52b9a4cee861eb4ad61d29743aef183684cf62ca018957cc4a77949e49fde1d33894e
-
SSDEEP
1536:b3uo1iZ3gzfP1XZn8RCDJ//hgbV+2696+TEkqhntqEddGQGWpuE2SDU68m1/d:b3uqiY9J8RyJ3hgbwG6E3ttqEWGdBTd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e2b6214570ada177d9bf9e6a6acc3920_JaffaCakes118
Files
-
e2b6214570ada177d9bf9e6a6acc3920_JaffaCakes118.exe windows:4 windows x86 arch:x86
1066d50de0d3eaf7f38601349c0f8844
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
WaitForSingleObject
CreateProcessA
WinExec
GetLastError
DuplicateHandle
LoadLibraryA
OpenProcess
WriteFile
GetVersionExA
GetModuleFileNameA
SetFileTime
GetFileAttributesExA
GetStartupInfoA
GetModuleHandleA
GetProcAddress
Sleep
CloseHandle
FreeLibrary
WideCharToMultiByte
GetSystemDirectoryA
CreateFileA
GetCurrentProcess
user32
GetDesktopWindow
DispatchMessageA
TranslateMessage
GetMessageA
ShowWindow
CreateWindowExA
RegisterClassExA
SendMessageTimeoutA
RegisterWindowMessageA
GetClassNameA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
DefWindowProcA
PostQuitMessage
advapi32
LookupAccountNameA
OpenSCManagerA
DeleteService
OpenServiceA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CreateServiceA
StartServiceA
ConvertSidToStringSidA
GetUserNameA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
shlwapi
SHGetValueA
SHSetValueA
msvcrt
__CxxFrameHandler
_stricmp
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??2@YAPAXI@Z
??3@YAXPAX@Z
time
srand
fopen
fwrite
fflush
fclose
_strlwr
sprintf
_access
rand
wcslen
atoi
strchr
strstr
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ