Static task
static1
Behavioral task
behavioral1
Sample
e902795f96d36fc7f6b7e2f39ee36208_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
e902795f96d36fc7f6b7e2f39ee36208_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e902795f96d36fc7f6b7e2f39ee36208_JaffaCakes118
-
Size
83KB
-
MD5
e902795f96d36fc7f6b7e2f39ee36208
-
SHA1
1dede6a2d9316db142d11eb6e344c9a3762bc552
-
SHA256
dc992481c88d7ad3329bfa20077547fce0f63d5ad9d848593c81f1fb3b6845bd
-
SHA512
6065cca0c4499e1107aa92c565031504fdaa08380c4c637e5bd1f29587c499625d85857fffe4d8cd55cb0c9b34ad761f267c8b7c7cf3f2558e3a486fc0a19124
-
SSDEEP
1536:FLHAXbN4asbE+mFQ9hqULcfG1Yk9/MKD7kxggs:pgXmaUEnFQ9hqULQG1Y1KD7kmgs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e902795f96d36fc7f6b7e2f39ee36208_JaffaCakes118
Files
-
e902795f96d36fc7f6b7e2f39ee36208_JaffaCakes118.exe windows:4 windows x86 arch:x86
fff1eea0fd4a1e2911b404c863143995
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileExA
FindClose
CopyFileA
WriteFile
FreeLibrary
CloseHandle
GetPrivateProfileStringA
FindFirstFileA
DeleteFileA
FindNextFileA
SetFileAttributesA
MoveFileA
GetDriveTypeA
GetWindowsDirectoryA
GetSystemDirectoryA
CreateDirectoryA
SearchPathA
lstrcpynA
GetShortPathNameA
LoadLibraryA
lstrlenA
GetProcAddress
Sleep
GetCurrentProcess
GetVersionExA
CreateFileA
RemoveDirectoryA
lstrcpyA
GetStartupInfoA
GetModuleHandleA
SetEndOfFile
SetFilePointer
ReadFile
GetStringTypeW
GetStringTypeA
FlushFileBuffers
lstrcatA
SetCurrentDirectoryA
GetCommandLineA
SetStdHandle
WaitForSingleObject
GetExitCodeProcess
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
GetLastError
GetFileAttributesA
GetCurrentDirectoryA
GetFullPathNameA
HeapAlloc
MultiByteToWideChar
CreateProcessA
WideCharToMultiByte
HeapDestroy
GetVersion
ExitProcess
TerminateProcess
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
user32
DispatchMessageA
TranslateMessage
IsDialogMessageA
GetMessageA
UpdateWindow
ShowWindow
DialogBoxParamA
CreateWindowExA
PostQuitMessage
wsprintfA
RegisterClassExA
LoadCursorA
LoadStringA
LoadIconA
KillTimer
DefWindowProcA
SendMessageA
GetDlgItem
DestroyWindow
CreateDialogParamA
EndDialog
BringWindowToTop
ExitWindowsEx
FindWindowA
SetTimer
MessageBoxA
gdi32
GetStockObject
advapi32
RegCloseKey
RegSetValueExA
RegEnumValueA
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
RegDeleteKeyA
RegEnumKeyExA
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
AdjustTokenPrivileges
CloseServiceHandle
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyA
comctl32
ord17
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 859B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ