Static task
static1
Behavioral task
behavioral1
Sample
f529f75e6df035665d082b928b775674_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f529f75e6df035665d082b928b775674_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f529f75e6df035665d082b928b775674_JaffaCakes118
-
Size
172KB
-
MD5
f529f75e6df035665d082b928b775674
-
SHA1
2bc725098422eddbc04695c7dfa0d3fb28d001d0
-
SHA256
b354be3b7478324568c70cae99d7cdc15d7ff4363d846bb1d3d326b00d61b653
-
SHA512
af4da6b4f6e0e48cecf36397e63ab7c9aad15b789fea5ab8131891ac57c0068ed97333b326199a69ab5fdcaeec4b14d8cf049ab282b162f418fecb7dde0d732e
-
SSDEEP
3072:l3iAwFsoUV2GNOK9cxQgNKjTpkZAkgHFjb7Q0myadeiYM6oN6k6:l31qG2K9bgNCTpQyDEEo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f529f75e6df035665d082b928b775674_JaffaCakes118
Files
-
f529f75e6df035665d082b928b775674_JaffaCakes118.exe windows:4 windows x86 arch:x86
a27f12ee6fea44f08f3d5f49636746cb
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ControlService
EqualSid
GetSecurityDescriptorControl
GetUserNameA
InitializeSecurityDescriptor
LockServiceDatabase
RegCreateKeyExA
RegDeleteValueA
RegOpenKeyA
RegQueryInfoKeyA
kernel32
AddAtomA
CloseHandle
CreateEventA
CreateMutexA
CreateProcessA
CreateThread
DeleteAtom
DeviceIoControl
DisableThreadLibraryCalls
ExitProcess
ExitThread
ExpandEnvironmentStringsA
FileTimeToLocalFileTime
FindClose
GetACP
GetComputerNameA
GetConsoleCP
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetEnvironmentVariableA
GetExitCodeProcess
GetFileSize
GetFileTime
GetFileType
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetThreadTimes
GetTickCount
GetTimeZoneInformation
GetVersionExA
GetWindowsDirectoryA
GlobalFree
GlobalUnlock
HeapAlloc
HeapDestroy
HeapFree
InitializeCriticalSection
InterlockedCompareExchange
InterlockedIncrement
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
MapViewOfFile
MoveFileExA
OpenEventA
OutputDebugStringA
QueryPerformanceCounter
ReadFile
ReadProcessMemory
RemoveDirectoryA
SearchPathA
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFileAttributesA
SetFilePointer
SetLastError
Sleep
SystemTimeToFileTime
TerminateProcess
TlsAlloc
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualQuery
WriteConsoleA
WritePrivateProfileStringA
lstrlenA
ole32
CLSIDFromProgID
CoCreateGuid
CoUninitialize
CreateBindCtx
OleUninitialize
ReleaseStgMedium
user32
CharLowerA
CharNextA
CopyRect
DestroyMenu
DrawFocusRect
EndDialog
FindWindowA
GetDC
GetDesktopWindow
GetDlgCtrlID
GetParent
GetWindowLongA
GetWindowTextA
InvalidateRect
IsDlgButtonChecked
KillTimer
LoadCursorA
LoadStringA
MessageBoxA
MsgWaitForMultipleObjects
PostMessageA
ReleaseDC
SendDlgItemMessageA
SetWindowRgn
SystemParametersInfoA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
CODE Size: 62KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CRT Size: 103KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ