Static task
static1
Behavioral task
behavioral1
Sample
038d462fd5e92f0e3280695869b5bc19_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
038d462fd5e92f0e3280695869b5bc19_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
038d462fd5e92f0e3280695869b5bc19_JaffaCakes118
-
Size
337KB
-
MD5
038d462fd5e92f0e3280695869b5bc19
-
SHA1
8c085be2e38b0f6b445aeb9415fc5f5964aa5d21
-
SHA256
5366de995770690760cfa48072346c57cac2476e0c2f767d52084d1731a57c58
-
SHA512
0417ebacbe2af060f80fa98bf17d6ec53511ebff8caa65ec7397d752dd7adf5ce14c26db0d23be2c92cd5428a5e0be1af8226edb5f6d1fa81f66491aa5bc7adf
-
SSDEEP
6144:Q6Edl48TBqvuH/nspX7wRI9E+k84pxy9t6lYK9u3hhpIUJ7g:QHdl48TQvufspL4Z+2A9t6l3U3DpIG7g
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 038d462fd5e92f0e3280695869b5bc19_JaffaCakes118
Files
-
038d462fd5e92f0e3280695869b5bc19_JaffaCakes118.exe windows:4 windows x86 arch:x86
61c035e2b4bbab97d7710a43ae4de6a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2764
ord2763
ord6662
ord4278
ord533
ord5194
ord3811
ord540
ord3337
ord2818
ord6407
ord1997
ord537
ord798
ord535
ord5683
ord5710
ord860
ord941
ord939
ord4129
ord858
ord823
ord825
ord536
ord2915
ord5572
ord800
ord354
ord5186
ord665
ord5773
ord5442
ord1979
msvcrt
_exit
_onexit
__dllonexit
free
malloc
_stricmp
_strnicmp
exit
_acmdln
__getmainargs
strcmp
time
srand
rand
strstr
_vsnprintf
wcslen
printf
_wcsicmp
_mbscmp
sprintf
memcpy
strcpy
strcat
memset
__CxxFrameHandler
strlen
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_XcptFilter
_controlfp
_strcmpi
kernel32
FindFirstFileA
GetStartupInfoA
CreateProcessA
CreateFileA
GetFileSize
ReadFile
GetSystemDirectoryA
GetModuleFileNameA
OutputDebugStringA
ExitProcess
CreateThread
Sleep
HeapAlloc
GetProcessHeap
WriteFile
SizeofResource
LockResource
LoadResource
FindResourceA
MultiByteToWideChar
GetCurrentProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
UnmapViewOfFile
ReadProcessMemory
MapViewOfFile
CreateFileMappingA
WriteProcessMemory
VirtualProtectEx
VirtualQueryEx
OpenProcess
CloseHandle
CopyFileA
GlobalAlloc
LoadLibraryExA
GlobalFree
GetLocalTime
SetLocalTime
GetVersionExA
IsBadReadPtr
LocalFree
GetFileInformationByHandle
CreatePipe
GetStdHandle
GetVersion
GetCurrentProcessId
lstrcatA
LoadLibraryA
FreeLibrary
lstrlenA
VirtualAllocEx
GetModuleHandleA
GetProcAddress
CreateRemoteThread
GetLastError
HeapFree
user32
PostMessageA
FindWindowExA
MessageBoxA
FindWindowA
advapi32
AdjustTokenPrivileges
OpenProcessToken
DeregisterEventSource
ReportEventA
RegisterEventSourceA
CloseServiceHandle
StartServiceA
RegOpenKeyA
CreateServiceA
OpenSCManagerA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
SetSecurityInfo
SetEntriesInAclA
GetUserNameA
GetSecurityInfo
LookupPrivilegeValueA
shell32
ShellExecuteA
msvcp60
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADHD@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
Sections
.text Size: 48KB - Virtual size: 46KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ