Static task
static1
Behavioral task
behavioral1
Sample
750bac4138c55e0dfed67c280447f3de_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
750bac4138c55e0dfed67c280447f3de_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
750bac4138c55e0dfed67c280447f3de_JaffaCakes118
-
Size
70KB
-
MD5
750bac4138c55e0dfed67c280447f3de
-
SHA1
d0dfaeac84ff6f6d72dea30c5897b9c5421f9e7b
-
SHA256
c9f11d0b45422cffc952c64c7a4516383cbfd03f452dbb22b25dfc5bdd490826
-
SHA512
2c4d4497b308a50f3a8a141ca8fc924fb61a6337cb56a2f99f3c48ffedae3db1c82424972cc2bc07fb8d624e0a74fe450bb2f26b2895cc53799e22bda85d0b80
-
SSDEEP
1536:vW9/jZ4vBW455Ts9bhU1JRsdwHmOhGtSf9BLtjtE4Wcak5I0j:vW9/jZ45T5Ts9bhU1JRsdwGOwQY+p5Vj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 750bac4138c55e0dfed67c280447f3de_JaffaCakes118
Files
-
750bac4138c55e0dfed67c280447f3de_JaffaCakes118.exe windows:5 windows x86 arch:x86
9fe072a53bc74e0ef32d69c8ea0fce6b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc90
ord436
ord686
ord5761
ord6802
ord2139
ord5608
ord5389
ord2623
ord6780
ord5585
ord639
ord374
ord3506
ord4668
ord5636
ord1496
ord6388
ord3344
ord1678
ord1809
ord1810
ord2208
ord5309
ord5152
ord4617
ord5615
ord4993
ord3987
ord4029
ord4952
ord2447
ord589
ord3659
ord4890
ord3110
ord6001
ord5646
ord5663
ord4981
ord4333
ord5659
ord5657
ord3209
ord2087
ord4199
ord5813
ord6721
ord5533
ord1046
ord4165
ord6018
ord2206
ord2251
ord4733
ord6781
ord4159
ord6783
ord4409
ord4434
ord793
ord6791
ord5750
ord1247
ord3579
ord1137
ord1254
ord1252
ord265
ord266
ord757
ord3620
ord553
ord1755
ord1752
ord4331
ord4650
ord2074
ord5497
ord4589
ord3732
ord5139
ord4688
ord1729
ord6446
ord5668
ord5666
ord958
ord963
ord967
ord965
ord969
ord2610
ord2630
ord2614
ord2620
ord2618
ord2616
ord2633
ord2628
ord2612
ord2635
ord2605
ord2607
ord2625
ord2375
ord2368
ord1644
ord6784
ord4160
ord6782
ord3671
ord6356
ord3218
ord1446
ord1792
ord1791
ord1728
ord5633
ord2766
ord2978
ord3107
ord4714
ord2961
ord3135
ord2769
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord4895
ord4667
ord800
ord1276
msvcr90
free
_controlfp_s
_invoke_watson
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
_setmbcp
_stricmp
_except_handler4_common
_CxxThrowException
memcpy_s
memset
__CxxFrameHandler3
malloc
_ismbblead
kernel32
HeapFree
FindResourceA
LoadResource
LockResource
GetVersion
SetLastError
GetCurrentThreadId
WTSGetActiveConsoleSessionId
GetProcAddress
LoadLibraryA
GetVersionExA
GetProcessHeap
VirtualAlloc
SizeofResource
lstrcpyA
GetSystemDirectoryA
FindClose
FindNextFileA
FindFirstFileA
GetModuleFileNameA
GetWindowsDirectoryA
TerminateProcess
ResumeThread
WriteProcessMemory
ExitProcess
GetCommandLineA
FreeLibrary
InterlockedExchange
InterlockedCompareExchange
GetStartupInfoA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
CloseHandle
OpenProcess
GetCurrentProcessId
Sleep
GetLastError
GetSystemTimeAsFileTime
user32
EnableWindow
advapi32
GetSidSubAuthorityCount
LookupAccountSidA
GetSidSubAuthority
DuplicateTokenEx
LookupPrivilegeValueA
SetSecurityInfo
GetUserNameA
ole32
CoUninitialize
oleaut32
VariantClear
GetErrorInfo
msvcp90
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??$?9DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NPBDABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@@Z
??$?HDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@ABV10@PBD@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
wtsapi32
WTSQueryUserToken
Sections
.text Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ