Static task
static1
Behavioral task
behavioral1
Sample
0f1e601ad913358ff8837d3fa7178276_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0f1e601ad913358ff8837d3fa7178276_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0f1e601ad913358ff8837d3fa7178276_JaffaCakes118
-
Size
180KB
-
MD5
0f1e601ad913358ff8837d3fa7178276
-
SHA1
65667db08a217f6ab4165f40ca0fb221b8ccd917
-
SHA256
d690a4daf771a692d88e944298bfcd960b60e02b866004f2a1e047985c8b2ac9
-
SHA512
3fd58fac8feb12cce5d07e10448826cbdac3f7318ea01c5c7917f577f8869f0339eabb5052ea752ddebc631ba055217963e5304d388ad8cb6ec737940f515afe
-
SSDEEP
1536:jbx2QrJm19ujDvnwf30frd5WDfeFuDpApjYbTVtccYIDP9IxvmrKIyCks8OEGP/h:Rp01SnwfkfxT4a1YaWIsyzsV/h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f1e601ad913358ff8837d3fa7178276_JaffaCakes118
Files
-
0f1e601ad913358ff8837d3fa7178276_JaffaCakes118.exe windows:4 windows x86 arch:x86
8b81c1e290833e3ee551f690ce647ca5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
FreeLibrary
Sleep
GetProcAddress
LoadLibraryA
TerminateProcess
WaitForSingleObject
CreateProcessA
GetModuleFileNameA
GetLastError
SetFileTime
GetFileAttributesExA
GetStartupInfoA
GetModuleHandleA
GetVersionExA
CreateFileA
WriteFile
OpenProcess
GetCurrentProcess
DuplicateHandle
CloseHandle
GetSystemDirectoryA
WinExec
user32
TranslateMessage
GetMessageA
SendMessageTimeoutA
GetDesktopWindow
GetClassNameA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
ShowWindow
CreateWindowExA
DefWindowProcA
DispatchMessageA
RegisterClassExA
RegisterWindowMessageA
PostQuitMessage
advapi32
OpenServiceA
OpenSCManagerA
ConvertSidToStringSidA
LookupAccountNameA
GetUserNameA
CreateServiceA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
StartServiceA
DeleteService
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
msvcrt
strchr
_strlwr
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??2@YAPAXI@Z
??3@YAXPAX@Z
__CxxFrameHandler
strstr
_stricmp
rand
srand
time
_access
fclose
fflush
fwrite
fopen
sprintf
wcslen
atoi
shlwapi
SHSetValueA
SHGetValueA
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ