Static task
static1
Behavioral task
behavioral1
Sample
16c40cf6cba420cde46822a0d9db09ef_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
16c40cf6cba420cde46822a0d9db09ef_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
16c40cf6cba420cde46822a0d9db09ef_JaffaCakes118
-
Size
108KB
-
MD5
16c40cf6cba420cde46822a0d9db09ef
-
SHA1
a80274c98ebba3edb2f27988e747dd2297384900
-
SHA256
90deb0dd1eff2dc89186255ec024e7aa99c898b3535f1ea82d24bc286a263af6
-
SHA512
f3a019f748ad8270589b9c90d544f87fb321d8c63558bda9a5f04c3534d9432779df61b7404af6199f8a15fff4eda669fab4777bea903db12b81b32fa38f70cf
-
SSDEEP
1536:bzlZmVuqL4Q2at0DouonqdHTqBPWIpzcBj5JcMOkDOksjc1Cfx:t7qR2azqdS+nlJcMOKORjcA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 16c40cf6cba420cde46822a0d9db09ef_JaffaCakes118
Files
-
16c40cf6cba420cde46822a0d9db09ef_JaffaCakes118.exe windows:4 windows x86 arch:x86
2ebc4abd1732f66d1d3ace16bdd2b97e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord5710
ord6883
ord533
ord5194
ord5465
ord1871
ord940
ord6407
ord6010
ord1997
ord798
ord1168
ord356
ord2770
ord1980
ord668
ord1105
ord6383
ord5440
ord6394
ord5450
ord1567
ord3318
ord268
ord2393
ord5861
ord6143
ord541
ord801
ord4204
ord4129
ord354
ord5186
ord5442
ord1979
ord860
ord4202
ord6663
ord540
ord537
ord858
ord2818
ord939
ord535
ord1187
ord353
ord665
ord800
ord823
ord825
ord3663
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p___initenv
exit
_XcptFilter
_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
srand
rand
atoi
_ftol
memmove
_strnicmp
_mbscmp
time
strrchr
isdigit
_mbsstr
_stricmp
sprintf
memset
__CxxFrameHandler
strlen
calloc
free
memcmp
memcpy
_CxxThrowException
_mbstok
_mbsnbcat
wcscpy
mbstowcs
getenv
_splitpath
_ltoa
_itoa
wcstombs
strcat
vsprintf
strncpy
_fcvt
strcpy
_except_handler3
kernel32
SetFileTime
GetFileTime
CreateToolhelp32Snapshot
Process32First
Process32Next
Module32First
Module32Next
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleFileNameA
OpenProcess
MoveFileExA
CopyFileA
SetEndOfFile
CreateFileA
GetFileSize
CloseHandle
GlobalAlloc
ReadFile
GlobalFree
TerminateProcess
ResumeThread
SetThreadContext
WriteProcessMemory
VirtualAllocEx
GetModuleHandleA
VirtualProtectEx
VirtualAlloc
WriteFile
SetFilePointer
CreateEventA
Sleep
SetEvent
WaitForSingleObject
GetSystemDirectoryA
MapViewOfFile
CreateFileMappingA
UnmapViewOfFile
GetTickCount
DeleteFileA
GetVersionExA
GetLastError
CreateMutexA
HeapFree
HeapAlloc
GetProcessHeap
GetFileInformationByHandle
VirtualQueryEx
GetThreadContext
GetWindowsDirectoryA
CreateThread
LoadLibraryExA
DeviceIoControl
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
lstrcatA
CreateDirectoryA
SystemTimeToFileTime
LocalFileTimeToFileTime
FindFirstFileA
FindClose
FindResourceA
LoadResource
LockResource
GetCurrentThread
GetCurrentProcess
GetComputerNameA
GetCurrentThreadId
TerminateThread
CreateProcessA
user32
wsprintfA
advapi32
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
CloseServiceHandle
StartServiceA
OpenServiceA
OpenSCManagerA
GetUserNameA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
OpenThreadToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
DeleteService
QueryServiceConfigA
CreateServiceA
ControlService
SetServiceStatus
Sections
.text Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 208B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.svx Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ