Static task
static1
Behavioral task
behavioral1
Sample
0907cf3684b599c731927f305e0b81f6_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0907cf3684b599c731927f305e0b81f6_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0907cf3684b599c731927f305e0b81f6_JaffaCakes118
-
Size
53KB
-
MD5
0907cf3684b599c731927f305e0b81f6
-
SHA1
c4ce4925bfa4bee9dbea1581ef3ba2afe3f545e5
-
SHA256
638e0c160b1c55b5a90035f0004829875305b6b1236f928a6e6ece8487b3712e
-
SHA512
12ee645d44e34633a13744772415b0abf99090f8410d1b56e33ce6afeb891a7434d20aadf81ee88af58ed2bf16672da424fb505582fa73434a202b869b71fbaf
-
SSDEEP
1536:+aMS4Z+mL6OCyL7mKdYX4wEkaUtPqIkF4:+aT4Z+7g7mIYX4wEkaW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0907cf3684b599c731927f305e0b81f6_JaffaCakes118
Files
-
0907cf3684b599c731927f305e0b81f6_JaffaCakes118.exe windows:4 windows x86 arch:x86
35f16c065c4c75e78da5de547f81c572
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AllocateAndInitializeSid
CloseServiceHandle
CreateServiceA
FreeSid
GetTokenInformation
OpenServiceA
QueryServiceConfig2A
RegCloseKey
RegQueryValueA
SetSecurityDescriptorDacl
SetServiceStatus
kernel32
CreateFileA
CreateProcessA
CreateThread
DeleteFileA
DisableThreadLibraryCalls
DuplicateHandle
EnterCriticalSection
ExitProcess
FindNextFileA
FindResourceA
FreeLibrary
GetACP
GetCommandLineA
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetEnvironmentStringsA
GetExitCodeProcess
GetFileSize
GetFileTime
GetFileType
GetLastError
GetModuleHandleA
GetOEMCP
GetPrivateProfileSectionNamesA
GetPrivateProfileStructA
GetProcessHeap
GetShortPathNameA
GetStdHandle
GetStringTypeA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameA
GetThreadLocale
GetThreadTimes
GetTickCount
GetTimeFormatA
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExA
GetWindowsDirectoryA
GlobalReAlloc
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
IsBadReadPtr
LCMapStringA
LoadLibraryA
LoadLibraryExA
LoadResource
LockResource
MapViewOfFile
Module32First
Module32Next
MulDiv
OpenEventA
QueryPerformanceCounter
ReadFile
ResumeThread
RtlUnwind
SetCurrentDirectoryA
SetErrorMode
SetHandleCount
SetUnhandledExceptionFilter
Sleep
SuspendThread
TerminateProcess
VirtualAlloc
VirtualProtect
VirtualQuery
WaitForSingleObject
WriteConsoleA
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcmpiA
lstrcpyA
lstrlenA
user32
BeginPaint
CharNextA
CharPrevA
CheckMenuItem
DispatchMessageA
EnumChildWindows
EqualRect
GetCursorPos
GetDlgCtrlID
GetDlgItemTextA
GetKeyState
GetMenuItemCount
GetMessageA
GetWindowPlacement
GetWindowTextA
IsWindow
LoadIconA
MessageBoxA
OffsetRect
PostMessageA
PostQuitMessage
RegisterClassA
RegisterWindowMessageA
SetFocus
SetWindowPos
SetWindowRgn
UnhookWindowsHookEx
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.INIT Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ