Static task
static1
Behavioral task
behavioral1
Sample
0cc2a331b3b2a3327a6a9f8cd8605952_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0cc2a331b3b2a3327a6a9f8cd8605952_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0cc2a331b3b2a3327a6a9f8cd8605952_JaffaCakes118
-
Size
67KB
-
MD5
0cc2a331b3b2a3327a6a9f8cd8605952
-
SHA1
190ed7c20070c651e97bc5eb727d070c87ed14fe
-
SHA256
19bfb77cf0f45782acd545b3d951406c4b173cd23b8f1038567328af2f310732
-
SHA512
885699e515853a2263556b76eb200744bc6d7f28d5c70738b649528abc775ac0ea7a61c5092f7d30dca82cae79b35a9ee2465dc0aa659eeed9f33bf45a4c88b4
-
SSDEEP
1536:1zTChLMZO0g8bHU6E3GEaKpmz0Wjqr0/ki:9TCqHH09aKUQjr0/ki
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0cc2a331b3b2a3327a6a9f8cd8605952_JaffaCakes118
Files
-
0cc2a331b3b2a3327a6a9f8cd8605952_JaffaCakes118.exe windows:4 windows x86 arch:x86
f8ea6aba884832f7fb572c55eee20f08
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ChangeServiceConfig2A
ChangeServiceConfigA
GetTokenInformation
OpenServiceA
QueryServiceConfig2A
RegCloseKey
RegEnumValueA
RegQueryValueExA
RegSetValueExA
StartServiceA
kernel32
CloseHandle
CompareStringA
ContinueDebugEvent
CreateEventA
CreateProcessA
DeleteCriticalSection
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindResourceA
FreeEnvironmentStringsA
FreeLibrary
GetCPInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStringsA
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetModuleHandleA
GetPrivateProfileSectionA
GetPrivateProfileSectionNamesA
GetPrivateProfileStructA
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetSystemDirectoryA
GetTickCount
GetTimeZoneInformation
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
HeapAlloc
HeapDestroy
HeapFree
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
IsBadCodePtr
IsDebuggerPresent
LCMapStringA
LoadLibraryA
LocalAlloc
LocalFree
LockResource
Module32First
MoveFileA
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
ReadFile
ReleaseMutex
RemoveDirectoryA
ResumeThread
RtlUnwind
SearchPathA
SetCurrentDirectoryA
SetEndOfFile
SetErrorMode
SetHandleCount
SetLastError
SetStdHandle
SetThreadPriority
SizeofResource
Sleep
SuspendThread
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WriteConsoleA
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcmpiA
lstrcpyA
lstrlenA
user32
CharNextA
CharUpperA
CreatePopupMenu
DefWindowProcA
GetActiveWindow
GetClassNameA
GetDlgItemTextA
GetParent
GetSubMenu
GetSystemMetrics
GetWindowDC
GetWindowTextA
IsWindowEnabled
LoadBitmapA
LoadImageA
LoadStringA
MessageBoxA
MoveWindow
PeekMessageA
PostMessageA
RegisterWindowMessageA
ReleaseCapture
SetCapture
SetRect
SetWindowTextA
UnhookWindowsHookEx
UnregisterClassA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 28KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 16KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
pwufg Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
gpopf Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ