Static task
static1
Behavioral task
behavioral1
Sample
fa0eb2bb93b1b1400d2cf6cdffb02d0f_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fa0eb2bb93b1b1400d2cf6cdffb02d0f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fa0eb2bb93b1b1400d2cf6cdffb02d0f_JaffaCakes118
-
Size
108KB
-
MD5
fa0eb2bb93b1b1400d2cf6cdffb02d0f
-
SHA1
4608a79904c8f5bf699d7832d3d1cd816619f7e0
-
SHA256
2b9cd0c44e09ee3ff7da91588ca6e2b344ef962544fa31dead6eef80c73f5109
-
SHA512
66ac413cba6175825db0408801891bd222305785b62ffdf2ee33075309f60aa2018b2d00127fa32056eb01fcfa47abe80211f99c93e76b5e1c35708aedb83b28
-
SSDEEP
1536:tzu7PwkEqjw9EDalJaFEpLvj2uR5Ep7W4wPI2Ja1ifx:o7ozq89OaRhRDG7WpJaw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fa0eb2bb93b1b1400d2cf6cdffb02d0f_JaffaCakes118
Files
-
fa0eb2bb93b1b1400d2cf6cdffb02d0f_JaffaCakes118.exe windows:4 windows x86 arch:x86
cfe3080e6b9ddb3cad3a6dbcdcb54765
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord3663
ord825
ord823
ord800
ord665
ord353
ord1187
ord535
ord1871
ord939
ord2818
ord858
ord537
ord540
ord6663
ord4202
ord860
ord1979
ord5442
ord5186
ord354
ord4129
ord4204
ord5710
ord6883
ord533
ord5194
ord5465
ord940
ord6407
ord6010
ord1997
ord798
ord1168
ord356
ord2770
ord1980
ord668
ord1105
ord6383
ord5440
ord6394
ord5450
ord1567
ord3318
ord268
ord2393
ord5861
ord6143
ord541
ord801
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
srand
rand
atoi
_ftol
memmove
_mbscmp
time
strrchr
isdigit
_mbsstr
_stricmp
sprintf
strlen
calloc
free
memcmp
memcpy
_CxxThrowException
_mbstok
_mbsnbcat
wcscpy
mbstowcs
getenv
_splitpath
_ltoa
_itoa
wcstombs
strcat
vsprintf
strncpy
_fcvt
strcpy
__CxxFrameHandler
memset
__setusermatherr
_strnicmp
kernel32
lstrcatA
GetVersionExA
DeleteFileA
GetTickCount
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
GetSystemDirectoryA
WaitForSingleObject
SetEvent
Sleep
CreateEventA
SetFilePointer
WriteFile
SetEndOfFile
SetFileTime
GetFileTime
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleFileNameA
OpenProcess
MoveFileExA
CopyFileA
GetWindowsDirectoryA
CreateFileA
GetFileSize
CloseHandle
GlobalAlloc
ReadFile
GlobalFree
CreateMutexA
VirtualQueryEx
GetThreadContext
CreateProcessA
GetModuleHandleA
VirtualAlloc
TerminateThread
GetCurrentThreadId
GetComputerNameA
GetCurrentProcess
GetCurrentThread
LockResource
LoadResource
FindResourceA
FindClose
CreateThread
LoadLibraryExA
DeviceIoControl
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
GetLastError
ResumeThread
CreateDirectoryA
SystemTimeToFileTime
LocalFileTimeToFileTime
FindFirstFileA
user32
wsprintfA
advapi32
CreateServiceA
ControlService
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CloseServiceHandle
StartServiceA
OpenServiceA
OpenSCManagerA
GetUserNameA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
OpenThreadToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
DeleteService
QueryServiceConfigA
ole32
CoCreateGuid
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.svx Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ