Static task
static1
Behavioral task
behavioral1
Sample
0ce4dc238b13f8165e7cfd9190a6ac3a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0ce4dc238b13f8165e7cfd9190a6ac3a_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0ce4dc238b13f8165e7cfd9190a6ac3a_JaffaCakes118
-
Size
54KB
-
MD5
0ce4dc238b13f8165e7cfd9190a6ac3a
-
SHA1
1c57df2313499e3d3df914bdfaad5268b07cdb86
-
SHA256
07051b66303a2efe671ad1cb0e24411a020c03f57bfdf825b85eceb2e1b62431
-
SHA512
187e0fe31e341308730a957190f1182143219c0328b37f4418479d7540467c7f75ff341c3cad66564f9d478eb15f7dd8eed9764b3066ec89277eb7d0a441ef9a
-
SSDEEP
768:CEVfqvSYJ4YcJfu7VCFfHwSv47fa6k1F0c4iPB3JLIqPTYWR:bViVJjsflFfqfa6kr0ePBiqP0e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ce4dc238b13f8165e7cfd9190a6ac3a_JaffaCakes118
Files
-
0ce4dc238b13f8165e7cfd9190a6ac3a_JaffaCakes118.exe windows:4 windows x86 arch:x86
5ceea4507360cebf953871c43a40284d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ChangeServiceConfig2A
DeleteService
EqualSid
InitializeSecurityDescriptor
RegDeleteKeyA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueA
SetSecurityDescriptorDacl
kernel32
CloseHandle
CopyFileA
CreateMutexA
CreateToolhelp32Snapshot
DeleteAtom
DeviceIoControl
DisableThreadLibraryCalls
DuplicateHandle
EnterCriticalSection
ExitProcess
ExitThread
FindNextFileA
FindResourceA
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
GetCPInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetDateFormatA
GetEnvironmentStringsA
GetEnvironmentVariableA
GetFileAttributesA
GetFileTime
GetLastError
GetLocalTime
GetModuleHandleA
GetPrivateProfileSectionA
GetPrivateProfileStringA
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetThreadLocale
GetThreadTimes
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalReAlloc
GlobalUnlock
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
MapViewOfFile
Module32First
MulDiv
OutputDebugStringA
QueryPerformanceCounter
ResumeThread
SearchPathA
SetEndOfFile
SetErrorMode
SetFileTime
SetLastError
SetPriorityClass
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
WriteConsoleA
WritePrivateProfileStringA
lstrcpyA
lstrcpynA
user32
CheckMenuItem
CreatePopupMenu
DispatchMessageA
DrawTextA
EnableWindow
EqualRect
ExitWindowsEx
GetDesktopWindow
GetDlgCtrlID
GetForegroundWindow
GetWindowLongA
GetWindowRect
IsChild
MessageBoxA
PeekMessageA
PtInRect
RegisterClassExA
RegisterClipboardFormatA
RegisterWindowMessageA
ScreenToClient
SetFocus
SetWindowLongA
SetWindowPos
SetWindowTextA
UnregisterClassA
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 13KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ