Static task
static1
Behavioral task
behavioral1
Sample
f046d52c02e5921f28ec5168b6024891_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f046d52c02e5921f28ec5168b6024891_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f046d52c02e5921f28ec5168b6024891_JaffaCakes118
-
Size
105KB
-
MD5
f046d52c02e5921f28ec5168b6024891
-
SHA1
9fe314eadbb523f8455c0639e1b155c6d4384e71
-
SHA256
bdd8854268a9cb6dffbb5f4b42442a64b388596adb250e527f3b8298694fc4b2
-
SHA512
be2ffe4ac6d0c5e328e3038b2e8a09112971d4c7c15e724e5c8cc2ce0559dca2ab21e0cfb64d34226e37e85f8b927457f8fc8911edfd1c46c566bf88db6c3b4c
-
SSDEEP
1536:5NrTZSSJw8oD5mmiKoBHgiLUffXWpkSv8652xDc7Q+BYrjQ6M:fTZhzoGlvLUnmn860c7LgM6M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f046d52c02e5921f28ec5168b6024891_JaffaCakes118
Files
-
f046d52c02e5921f28ec5168b6024891_JaffaCakes118.exe windows:4 windows x86 arch:x86
2fcd15091d67bfd9c29a248c69305b05
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
EnterCriticalSection
FindClose
FreeLibrary
GetACP
GetCPInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetModuleFileNameA
GetPrivateProfileSectionNamesA
GetProcAddress
GetStartupInfoA
GetSystemInfo
GetTempFileNameA
GetTempPathA
GetTimeFormatA
GetVersion
GetWindowsDirectoryA
GlobalAlloc
HeapCreate
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsValidCodePage
LoadLibraryA
LoadResource
Module32First
ReleaseMutex
RtlUnwind
SetCurrentDirectoryA
SetFileAttributesA
SetFilePointer
SuspendThread
TlsSetValue
VirtualAlloc
user32
CallWindowProcA
CharNextA
CharPrevA
CharUpperA
CreateDialogParamA
CreateWindowExA
DefWindowProcA
DestroyMenu
DestroyWindow
DrawIcon
EnableWindow
EndPaint
EnumChildWindows
GetClientRect
GetDC
GetMessageA
GetParent
GetWindowLongA
GetWindowTextLengthA
IsRectEmpty
LoadBitmapA
LoadCursorA
LoadImageA
MoveWindow
PeekMessageA
RegisterClipboardFormatA
SetDlgItemTextA
SetWindowRgn
SetWindowTextA
TrackPopupMenu
UnregisterClassA
UpdateWindow
wsprintfA
advapi32
AdjustTokenPrivileges
ChangeServiceConfig2A
ChangeServiceConfigA
CloseServiceHandle
ControlService
GetSecurityDescriptorControl
GetUserNameA
InitializeSecurityDescriptor
LockServiceDatabase
LookupAccountSidA
OpenProcessToken
OpenSCManagerA
QueryServiceStatus
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegFlushKey
RegOpenKeyA
RegOpenKeyExA
RegQueryValueA
RegQueryValueExA
RegSetValueExA
SetSecurityDescriptorDacl
SetServiceStatus
UnlockServiceDatabase
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ