Static task
static1
Behavioral task
behavioral1
Sample
0ee21350cfa6ac660e6f0a162c308174_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
0ee21350cfa6ac660e6f0a162c308174_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0ee21350cfa6ac660e6f0a162c308174_JaffaCakes118
-
Size
160KB
-
MD5
0ee21350cfa6ac660e6f0a162c308174
-
SHA1
41b22f42260c5bbe07148b42feab3a8119c3bf0d
-
SHA256
7526b17161bde179118fc9fd247dc4923e41a0004730a545f6c46f3851953e75
-
SHA512
5a2e689bd8d0580df7d766eeeff2341f088ef747e59d439ce7cf6ae38ad138c9b828545abdc5b399607354c5bf44f0bc962b380ef5648aa135283c84fb34c509
-
SSDEEP
1536:IR92zaRRkZrFdRfpelj0xI1VZKKW7TChPQ2m/OcFZNBNUmLPA59r+ZsQPWAMAWPx:IRTspBCho2vczLY5kPBMBPA0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ee21350cfa6ac660e6f0a162c308174_JaffaCakes118
Files
-
0ee21350cfa6ac660e6f0a162c308174_JaffaCakes118.exe windows:4 windows x86 arch:x86
255b9878493e3bb0e56f617c0c4bc993
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
Sleep
GetModuleFileNameA
SetFileTime
GetFileAttributesExA
WideCharToMultiByte
FreeLibrary
TerminateProcess
WaitForSingleObject
LoadLibraryA
GetVersionExA
GetStartupInfoA
GetModuleHandleA
GetProcAddress
GetLastError
GetSystemDirectoryA
CreateFileA
WriteFile
OpenProcess
GetCurrentProcess
DuplicateHandle
CloseHandle
CreateProcessA
user32
RegisterWindowMessageA
GetClassNameA
PostMessageA
SendMessageTimeoutA
GetWindowThreadProcessId
EnumWindows
DispatchMessageA
GetDesktopWindow
TranslateMessage
GetMessageA
ShowWindow
CreateWindowExA
PostQuitMessage
DefWindowProcA
EnumChildWindows
RegisterClassExA
advapi32
CreateServiceA
StartServiceA
OpenServiceA
ConvertSidToStringSidA
LookupAccountNameA
GetUserNameA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
DeleteService
OpenSCManagerA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
msvcrt
atoi
_stricmp
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_access
__CxxFrameHandler
strstr
strchr
_strlwr
sprintf
rand
fclose
fflush
fwrite
fopen
??3@YAXPAX@Z
??2@YAPAXI@Z
srand
time
wcslen
shlwapi
SHSetValueA
SHGetValueA
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 92KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ