Static task
static1
Behavioral task
behavioral1
Sample
ec8fdc2afc1cc7425aa6fd25beaded3c_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
ec8fdc2afc1cc7425aa6fd25beaded3c_JaffaCakes118.exe
Resource
win10v2004-20240319-en
General
-
Target
ec8fdc2afc1cc7425aa6fd25beaded3c_JaffaCakes118
-
Size
119KB
-
MD5
ec8fdc2afc1cc7425aa6fd25beaded3c
-
SHA1
35b944da6a936e0581703ed3563660d06df604f1
-
SHA256
ab407fb35e07bbc72a9560f427210140dc2ed31490eb71d477c36ef704cab73f
-
SHA512
661c3f77467e8d7fced7c9f9e19b36a1974a60cafda16a1a54ecadb12f643bb7b1a1c1b80bb394275f04636bc2d86e95dbcbd2f689ee29e5d5332532b93043a3
-
SSDEEP
3072:i//B6VbQXX3XItodU6g0x/uu0hoQcoS8l+CG:i//gVWnPdUuwkoS8l+CG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec8fdc2afc1cc7425aa6fd25beaded3c_JaffaCakes118
Files
-
ec8fdc2afc1cc7425aa6fd25beaded3c_JaffaCakes118.exe windows:4 windows x86 arch:x86
be2d55c19ddedf9708ad0c9a85196ff9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
GetCurrentHwProfileA
GetUserNameA
LookupPrivilegeValueA
OpenProcessToken
RegDeleteKeyA
RegOpenKeyExA
RegSetValueExA
kernel32
AddAtomA
BeginUpdateResourceA
CloseHandle
CopyFileA
CreateEventA
CreateFileA
CreateMutexA
CreateProcessA
CreateSemaphoreA
CreateThread
CreateToolhelp32Snapshot
EndUpdateResourceA
ExitProcess
ExitThread
FindAtomA
FindResourceA
FreeLibrary
FreeResource
GetAtomNameA
GetCommandLineA
GetComputerNameA
GetCurrentProcessId
GetCurrentThreadId
GetFileSize
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetTempPathA
GetThreadContext
GetTickCount
GetVolumeInformationA
GetWindowsDirectoryA
InterlockedDecrement
InterlockedIncrement
LoadLibraryA
LoadResource
LockResource
Module32First
Module32Next
OpenProcess
Process32First
Process32Next
ReadFile
ReadProcessMemory
ReleaseSemaphore
ResumeThread
SetEvent
SetFilePointer
SetLastError
SetThreadContext
SetUnhandledExceptionFilter
SizeofResource
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UpdateResourceA
VirtualAlloc
VirtualAllocEx
VirtualFree
VirtualProtect
VirtualProtectEx
VirtualQuery
WaitForSingleObject
WinExec
WriteFile
WriteProcessMemory
msvcrt
_itoa
_write
__getmainargs
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_iob
_onexit
_setmode
abort
atexit
atoi
calloc
ctime
exit
fclose
fopen
fputc
fputs
fread
free
fseek
ftell
fwrite
malloc
memchr
memcpy
memmove
printf
putchar
remove
signal
sprintf
strcat
strchr
strcmp
strcpy
strerror
strncpy
strstr
system
time
shell32
SHGetSpecialFolderPathA
ShellExecuteA
user32
CallNextHookEx
DispatchMessageA
GetForegroundWindow
GetKeyState
GetKeyboardState
GetLastInputInfo
GetMessageA
GetWindowTextA
MapVirtualKeyA
MessageBoxA
SetWindowsHookExA
ToAscii
TranslateMessage
wininet
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
InternetReadFile
ws2_32
WSACleanup
WSAStartup
closesocket
connect
gethostbyname
gethostname
htons
inet_addr
inet_ntoa
recv
send
socket
Sections
.text Size: 106KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 23KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 604B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ