Static task
static1
Behavioral task
behavioral1
Sample
10179bfa29c79e21cab8704ea369708a_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
10179bfa29c79e21cab8704ea369708a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
10179bfa29c79e21cab8704ea369708a_JaffaCakes118
-
Size
177KB
-
MD5
10179bfa29c79e21cab8704ea369708a
-
SHA1
4e26023f005f1d6466173dfd11f4d2db158dcd6a
-
SHA256
1ddefd1e2663ce3c81ddce9b37a757b1cb11c8bb60db9a65770d12944c3e7970
-
SHA512
bdf245cded28f3fc458744026d5ecdcc3bbbb630dc153ea4969db7b31fe0cd7b45ca554bac91a17d8ce05627c508c136c1b548f5e50e6811ea421d682b97e347
-
SSDEEP
3072:w2rp2DdDstzfwHx6J40zdcpiNIg0JwPnic6HQYo3wT66vlmlwz9RSi8fvNIC/:wOp2GzfEG40zu8NP0Kic6Hc3wT66vlm9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 10179bfa29c79e21cab8704ea369708a_JaffaCakes118
Files
-
10179bfa29c79e21cab8704ea369708a_JaffaCakes118.exe windows:4 windows x86 arch:x86
3046475cdc75a158c3fb4da20d2d5415
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
comctl32
InitCommonControls
kernel32
AllocConsole
AreFileApisANSI
CloseHandle
CreateDirectoryA
CreateFileA
CreateMutexA
CreateProcessA
CreateSemaphoreA
DeleteFileA
DuplicateHandle
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeEnvironmentStringsA
GetCommandLineA
GetCommandLineW
GetConsoleOutputCP
GetConsoleTitleA
GetCurrentProcess
GetCurrentProcessId
GetEnvironmentStrings
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetShortPathNameA
GetShortPathNameW
GetStartupInfoA
GetTempFileNameA
GetTempPathA
GetTickCount
GetVersionExA
GetWindowsDirectoryA
InitializeCriticalSection
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadResource
LockResource
MultiByteToWideChar
ReadFile
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryA
SearchPathA
SetConsoleTitleA
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcpynA
lstrlenA
msvcrt
_close
_fileno
_fstat
_isatty
_lseek
_open
_read
_stricmp
_wcslwr
_write
_HUGE
__getmainargs
__mb_cur_max
__p__environ
__set_app_type
_assert
_cexit
_errno
_fileno
_fmode
_fpreset
_iob
_isctype
_mkdir
_pctype
_putenv
_rmdir
_setmode
_strupr
_tempnam
abort
atexit
atoi
ctime
difftime
exit
fclose
fflush
fgets
fopen
fprintf
fread
free
fseek
fwprintf
fwrite
getc
getenv
malloc
memchr
memcpy
memmove
memset
mktime
printf
rand
remove
signal
sprintf
srand
strcat
strchr
strcmp
strcpy
strncmp
strncpy
strrchr
strstr
strtok
strtol
strtoul
swprintf
time
vfprintf
wcschr
wcscmp
wcscpy
wcslen
wcsncmp
wcsncpy
shell32
SHGetDesktopFolder
SHGetMalloc
SHGetPathFromIDListA
user32
DispatchMessageA
EnumWindows
ExitWindowsEx
FindWindowA
GetLastActivePopup
GetMessageA
GetWindowTextA
GetWindowThreadProcessId
IsIconic
IsWindowVisible
MessageBoxA
MessageBoxW
SetForegroundWindow
ShowWindow
TranslateMessage
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 49KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE