Static task
static1
Behavioral task
behavioral1
Sample
1761f4a51bb396665a4b811319c6d25f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1761f4a51bb396665a4b811319c6d25f_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1761f4a51bb396665a4b811319c6d25f_JaffaCakes118
-
Size
252KB
-
MD5
1761f4a51bb396665a4b811319c6d25f
-
SHA1
68535c293f8ce866437bf79fe88235e438cea75d
-
SHA256
8cdb18d9d09fe88ba6535295eea62d326200873bd81f6c9d26f0ee4f140662ca
-
SHA512
a202d7b873fd45aa98cace0459a1a6c8cee327b7c7c16ddfd3a1d15606937a3171d093a649b0e9a312c8f1e7d788ed19ce62bbb6d1e9628c85aca28a4bdc82d9
-
SSDEEP
6144:hVzVSleqEKiX2Lh7n0CqPgGATLZBBkhUt43essBAUz5WD:hV5SleqkkGCGA/deII
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1761f4a51bb396665a4b811319c6d25f_JaffaCakes118
Files
-
1761f4a51bb396665a4b811319c6d25f_JaffaCakes118.exe windows:4 windows x86 arch:x86
b6f7162d4a612d540322f202cb133dd2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shfolder
SHGetFolderPathA
kernel32
IsBadCodePtr
IsValidCodePage
IsValidLocale
GetUserDefaultLCID
GetDateFormatA
GetTimeFormatA
WaitForSingleObject
IsBadReadPtr
IsBadWritePtr
GetACP
GetCurrentThreadId
CreateEventA
GetExitCodeThread
IsBadStringPtrA
GetComputerNameA
WaitForMultipleObjects
lstrcpyA
LocalFree
GetSystemInfo
FreeLibrary
RaiseException
FatalAppExitA
TlsAlloc
GetModuleHandleA
SetUnhandledExceptionFilter
GetOEMCP
GetProcAddress
user32
wsprintfA
advapi32
RegCloseKey
RegOpenKeyA
RegQueryValueA
RegOpenKeyExA
RegQueryValueExA
GetUserNameA
ImpersonateLoggedOnUser
RevertToSelf
OpenThreadToken
OpenProcessToken
ole32
CoCreateGuid
quartz
AMGetErrorTextW
DllUnregisterServer
AMGetErrorTextA
AmpFactorToDB
DBToAmpFactor
DllGetClassObject
DllCanUnloadNow
authz
AuthziFreeAuditEventType
AuthzInitializeContextFromSid
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.QM Size: 1024B - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.DagW Size: 76KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Ceut Size: 512B - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lsCEUA Size: 1024B - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CYWZs Size: 1KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.AlD Size: 141KB - Virtual size: 221KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.PVjabH Size: 4KB - Virtual size: 454KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ