Static task
static1
Behavioral task
behavioral1
Sample
0b207531f47f4b26ec56e07c32563f84_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0b207531f47f4b26ec56e07c32563f84_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0b207531f47f4b26ec56e07c32563f84_JaffaCakes118
-
Size
184KB
-
MD5
0b207531f47f4b26ec56e07c32563f84
-
SHA1
1cc00dd531b6f6eb1536c4a7b5c6c6441b23c093
-
SHA256
48bcc4fa38667d090f215b9ed34df3392c0fc9efcb690d92ab4f2be424048e53
-
SHA512
123e88b0e045baccb2fbd4760e1cdd96dbb94862786174c452db76b6e1c2307d81c01abae4c0bd1cc388cfdce6ccb99854512b730cfb3493ea588fbad94e8a60
-
SSDEEP
1536:90wd8EIYA46hg+4T1Z1voCL96UVe8UtMq8MFYylmJVN1ZkBEbFr2Z5phPYw781xt:qk6SB1j5kUVfUNXmJVNTkB8AQwEomR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b207531f47f4b26ec56e07c32563f84_JaffaCakes118
Files
-
0b207531f47f4b26ec56e07c32563f84_JaffaCakes118.exe windows:4 windows x86 arch:x86
e5aa1046036560303580eefcf5f2c588
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetVersionExA
CreateProcessA
GetFileAttributesExA
DuplicateHandle
GetCurrentProcess
OpenProcess
WriteFile
GetStartupInfoA
GetModuleHandleA
WaitForSingleObject
TerminateProcess
Sleep
CloseHandle
LoadLibraryA
GetProcAddress
FreeLibrary
WideCharToMultiByte
CreateFileA
GetModuleFileNameA
GetSystemDirectoryA
WinExec
SetFileTime
user32
SendMessageTimeoutA
RegisterClassExA
RegisterWindowMessageA
GetClassNameA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
DispatchMessageA
GetDesktopWindow
TranslateMessage
GetMessageA
ShowWindow
CreateWindowExA
DefWindowProcA
PostQuitMessage
advapi32
CreateServiceA
StartServiceA
OpenServiceA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
OpenSCManagerA
ConvertSidToStringSidA
LookupAccountNameA
GetUserNameA
DeleteService
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
shlwapi
SHGetValueA
SHSetValueA
msvcrt
_access
_strlwr
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
fopen
fwrite
fflush
fclose
time
srand
??2@YAPAXI@Z
??3@YAXPAX@Z
_stricmp
sprintf
wcslen
atoi
strchr
strstr
rand
__CxxFrameHandler
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ