Static task
static1
Behavioral task
behavioral1
Sample
0ba09209f6fb64d2c9c4c0440234eca0_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
0ba09209f6fb64d2c9c4c0440234eca0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0ba09209f6fb64d2c9c4c0440234eca0_JaffaCakes118
-
Size
24KB
-
MD5
0ba09209f6fb64d2c9c4c0440234eca0
-
SHA1
5590526d02823d2799a8e21ebe4d124f223243ec
-
SHA256
8c8885b778802b2b8e82c5ac7f0dccc153e1a35d7b913a7337ca11cc8b81f1f3
-
SHA512
4102a6e3abbfc0915bdec460a19f634d01e003bd0065d84a9a930f2e47c00c55895cf652f8529256d44780d3302fc8a7ca97365b50a6568468ec6e7f63da77c8
-
SSDEEP
192:HnHGe8dNHNb52/LJTFJeNjBuZbooa4cGA1nKTK8Qcqqx6:Hn5wgTANFuZbda4cGQKW8QcX6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ba09209f6fb64d2c9c4c0440234eca0_JaffaCakes118
Files
-
0ba09209f6fb64d2c9c4c0440234eca0_JaffaCakes118.exe windows:4 windows x86 arch:x86
599d4e2d83adfc00385fb3df56a6ccb2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord668
ord823
ord825
ord537
ord924
ord923
ord356
ord2770
ord2781
ord4058
ord3181
ord800
msvcrt
_strlwr
strstr
strncat
_stricmp
__CxxFrameHandler
sprintf
kernel32
lstrcpyA
SetPriorityClass
SetThreadPriority
GetEnvironmentVariableA
GetShortPathNameA
Sleep
GetCurrentProcessId
CreateJobObjectA
lstrcatA
DuplicateHandle
GetCurrentProcess
CreateFileA
OpenProcess
ExitProcess
GetModuleFileNameA
WinExec
CreateThread
GetWindowsDirectoryA
GetLastError
CreateMutexA
GetCurrentThreadId
DeleteFileA
FindClose
FindNextFileA
FindFirstFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
ExitThread
GetDriveTypeA
GetLogicalDriveStringsA
SetFileAttributesA
CopyFileA
WriteFile
GetCurrentDirectoryA
SetProcessPriorityBoost
GetCurrentThread
user32
GetWindowThreadProcessId
FindWindowA
EnumWindows
FindWindowExA
GetWindowTextA
SetWindowTextA
SendMessageA
PostThreadMessageA
GetMessageA
advapi32
RegSetValueExA
RegDeleteKeyA
RegOpenKeyA
CloseServiceHandle
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegCreateKeyA
ControlService
shell32
ShellExecuteA
ShellExecuteExA
SHChangeNotify
ntdll
ZwClose
RtlAdjustPrivilege
ZwSystemDebugControl
ZwFreeVirtualMemory
ZwQuerySystemInformation
ZwAllocateVirtualMemory
ZwQueryInformationProcess
ZwDuplicateObject
ZwOpenProcess
ZwTerminateJobObject
ZwAssignProcessToJobObject
ZwTerminateProcess
CsrGetProcessId
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ