Static task
static1
Behavioral task
behavioral1
Sample
1002581b5a46fa0de8d4e012d4e2f385_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1002581b5a46fa0de8d4e012d4e2f385_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1002581b5a46fa0de8d4e012d4e2f385_JaffaCakes118
-
Size
592KB
-
MD5
1002581b5a46fa0de8d4e012d4e2f385
-
SHA1
eb2a9d2b32d21bd895cb5c8c9c2c736d4a7ea816
-
SHA256
b71120b4e1d96f95cb4ae85710c3d4c06dc22f63ea8819898ca194dddf500c5b
-
SHA512
8dc032b0eb65f508eadcf4315ddb1ae2719658455e9804e3771995c3e53a802a7492acec21897c23743dd97867b0c2fc5da20a7ee2c69fdf176b6aafd86a48c0
-
SSDEEP
12288:LE6X2+OImOJ88CztiauzLqX7OjgpU+S/KaiOuJ8:LM3jTnIaOOqMwSaiOY8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1002581b5a46fa0de8d4e012d4e2f385_JaffaCakes118
Files
-
1002581b5a46fa0de8d4e012d4e2f385_JaffaCakes118.exe windows:4 windows x86 arch:x86
190a3937f2deea1c942df5271482dc01
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegRestoreKeyA
LookupAccountSidA
StartServiceCtrlDispatcherA
RegNotifyChangeKeyValue
UnlockServiceDatabase
kernel32
VirtualQuery
GlobalFindAtomW
FindResourceExW
WriteProcessMemory
GetAtomNameA
GetCommState
EnumCalendarInfoA
TryEnterCriticalSection
ExitThread
GlobalFindAtomA
GetFileAttributesExA
EnumSystemCodePagesW
AllocConsole
GetComputerNameW
FindNextChangeNotification
GetPrivateProfileStringA
FlushFileBuffers
RaiseException
RemoveDirectoryW
SetConsoleMode
GetVolumeInformationW
SetFileAttributesA
CompareStringW
ScrollConsoleScreenBufferA
CreateProcessA
ReadFileScatter
FreeLibrary
SetCommMask
GetCommandLineW
GetEnvironmentVariableW
SetThreadAffinityMask
GlobalGetAtomNameW
GetVersion
GetCurrentDirectoryW
GetDriveTypeA
WaitNamedPipeA
IsBadStringPtrA
SetVolumeLabelA
FindCloseChangeNotification
MoveFileW
SetThreadLocale
SetConsoleCursorPosition
LoadLibraryExW
SetEnvironmentVariableW
CreateEventA
SetEvent
GetUserDefaultLangID
LocalLock
GetSystemDefaultLangID
SetCurrentDirectoryA
PulseEvent
ExitProcess
OutputDebugStringA
ole32
CoMarshalInterThreadInterfaceInStream
OleSave
CoCreateInstanceEx
OleConvertIStorageToOLESTREAM
comctl32
ImageList_GetDragImage
user32
ChangeDisplaySettingsExA
MessageBoxW
GetScrollBarInfo
EnableWindow
ToUnicodeEx
MessageBoxExA
SendMessageTimeoutA
GetWindowPlacement
ShowScrollBar
DrawStateA
CreateDialogParamA
GetClassInfoExW
GetSystemMetrics
MapWindowPoints
CheckDlgButton
EndMenu
DefDlgProcW
EnumThreadWindows
MsgWaitForMultipleObjects
SetTimer
InsertMenuA
MonitorFromRect
EnableMenuItem
GetMessageW
ws2_32
WSALookupServiceNextW
WSAAsyncGetProtoByNumber
WSANtohs
getsockname
version
GetFileVersionInfoSizeA
Sections
.text Size: 2KB - Virtual size: 250KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 268KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ