Static task
static1
Behavioral task
behavioral1
Sample
f288216532782ec17628359e958c5770_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f288216532782ec17628359e958c5770_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f288216532782ec17628359e958c5770_JaffaCakes118
-
Size
259KB
-
MD5
f288216532782ec17628359e958c5770
-
SHA1
ab8b926445591833bc38c0e052672abe55764540
-
SHA256
ec67cf3515236875531dc9f0c178a8511eb2d8096ae4ca89f5a43b22848eb2c5
-
SHA512
06b9a88594a838862d1fb64c2cc388d5a61e6fb888493e04131c6f00d4cd7b79eaeb175b7702b180f8961ccab6b074a0494cceb8fbe960e4e53ebd43d278836c
-
SSDEEP
6144:IWgDpe+c/k0Dr5qB+9yUjxxnPCEPAXYRtwH:Zgdehc0D9qB+4UraEtwH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f288216532782ec17628359e958c5770_JaffaCakes118
Files
-
f288216532782ec17628359e958c5770_JaffaCakes118.exe windows:4 windows x86 arch:x86
d59bac23267842291677b17d7c184ab4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvcrt
_rmdir
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_flsbuf
_iob
_isctype
_onexit
_pctype
_setmode
abort
atexit
atoi
clock
exit
fgets
free
getenv
malloc
memchr
memcpy
memmove
memset
realloc
remove
rename
signal
sprintf
strcat
strchr
strcmp
strcpy
strlen
strncmp
strncpy
strpbrk
strrchr
strstr
strtol
toupper
vsprintf
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
SetFileSecurityA
SetFileSecurityW
kernel32
AddAtomA
CloseHandle
CreateDirectoryA
CreateDirectoryW
CreateFileA
CreateFileW
CreateSemaphoreA
DeviceIoControl
ExitProcess
ExpandEnvironmentStringsA
ExpandEnvironmentStringsW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindAtomA
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FlushFileBuffers
FormatMessageA
GetAtomNameA
GetCPInfo
GetCurrentProcess
GetCurrentThread
GetDiskFreeSpaceA
GetDriveTypeA
GetFileAttributesA
GetFileAttributesW
GetFileTime
GetFileType
GetFullPathNameA
GetFullPathNameW
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStdHandle
GetSystemTime
GetVersionExA
InterlockedDecrement
InterlockedIncrement
IsDBCSLeadByte
LocalFileTimeToFileTime
LocalFree
MoveFileA
MultiByteToWideChar
ReadFile
ReleaseSemaphore
SetConsoleCtrlHandler
SetEndOfFile
SetErrorMode
SetFileAttributesA
SetFileAttributesW
SetFilePointer
SetFileTime
SetLastError
SetPriorityClass
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
WriteFile
shell32
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
user32
CharLowerA
CharToOemA
CharToOemBuffA
CharUpperA
ExitWindowsEx
OemToCharA
OemToCharBuffA
Sections
.text Size: 182KB - Virtual size: 183KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 53KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE