Static task
static1
Behavioral task
behavioral1
Sample
ec60a83bc444afb4cc7edfd91c9d46fa_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ec60a83bc444afb4cc7edfd91c9d46fa_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ec60a83bc444afb4cc7edfd91c9d46fa_JaffaCakes118
-
Size
184KB
-
MD5
ec60a83bc444afb4cc7edfd91c9d46fa
-
SHA1
96362e5fce0d093575de408ba81df24e9aa27528
-
SHA256
dbd20c5f654edbbce7a6ac5580e10d02aa607d0ac7132df47e7c63030b667bd4
-
SHA512
c6ff36f8826eeaac3b861dd6e382e544dd8cdafbb26417a0231e261b312c21833a3a566c1fd330abf3ec5e8fed2755be6166a9c1adf68153969031d698f46da9
-
SSDEEP
3072:arhKQ8PIb9+riaO/wPKEz0K1XQ7f2eyY2x2K0F07W9Q40tXqgHDqd1Wxz:Y4Ps9+riaowSe0KOE2K0F07W64LaDaWV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec60a83bc444afb4cc7edfd91c9d46fa_JaffaCakes118
Files
-
ec60a83bc444afb4cc7edfd91c9d46fa_JaffaCakes118.exe windows:4 windows x86 arch:x86
321c098ad5204f33c46648410a297bbf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetLastError
SetFileTime
GetFileAttributesExA
WideCharToMultiByte
FreeLibrary
TerminateProcess
CreateFileA
CreateProcessA
GetStartupInfoA
GetModuleHandleA
WriteFile
OpenProcess
WinExec
GetCurrentProcess
DuplicateHandle
CloseHandle
LoadLibraryA
GetProcAddress
Sleep
GetSystemDirectoryA
GetModuleFileNameA
WaitForSingleObject
user32
GetDesktopWindow
DispatchMessageA
TranslateMessage
GetMessageA
ShowWindow
CreateWindowExA
DefWindowProcA
PostQuitMessage
RegisterClassExA
SendMessageTimeoutA
RegisterWindowMessageA
GetClassNameA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
advapi32
GetUserNameA
CreateServiceA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
OpenSCManagerA
DeleteService
OpenServiceA
ConvertSidToStringSidA
LookupAccountNameA
StartServiceA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
shlwapi
SHGetValueA
SHSetValueA
msvcrt
fwrite
_strlwr
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
time
srand
__CxxFrameHandler
strstr
strchr
atoi
wcslen
fopen
_stricmp
sprintf
rand
_access
??3@YAXPAX@Z
??2@YAPAXI@Z
fclose
fflush
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ