Static task
static1
Behavioral task
behavioral1
Sample
18788454008748bf8bf12ca4ee71f5e6_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
18788454008748bf8bf12ca4ee71f5e6_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
18788454008748bf8bf12ca4ee71f5e6_JaffaCakes118
-
Size
449KB
-
MD5
18788454008748bf8bf12ca4ee71f5e6
-
SHA1
214513448d163e4e3b2ba9ba56dab8bccef361e6
-
SHA256
ee4329c642e888fe137d2b7520738759a3f04ddb197b9ac2860dd031ed6dc4ed
-
SHA512
e2cb08318b4e73bd5f13e16035169016aafce6c766adf06d97e100e7ae5ac86ce1505bd5b2d8e4934539d98d79d938e09d8f2fe96c9fa57c83f49a0b26475335
-
SSDEEP
12288:GXGhn1uJPdD9W61V6L0286yPdhVsbil7dnTKFSL6k:Gu2r12gvdh7dG8L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 18788454008748bf8bf12ca4ee71f5e6_JaffaCakes118
Files
-
18788454008748bf8bf12ca4ee71f5e6_JaffaCakes118.exe windows:5 windows x86 arch:x86
a8f29cd51bcaf655e660286f12ddaa15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_except_handler3
strncpy
sprintf
wcscpy
wcsncpy
memmove
wcschr
wcslen
free
malloc
_initterm
_adjust_fdiv
kernel32
GetTempFileNameW
LoadLibraryA
MoveFileA
GetFileAttributesA
FileTimeToDosDateTime
WideCharToMultiByte
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcpyW
CloseHandle
LocalFree
SetEvent
Sleep
InterlockedExchange
InterlockedCompareExchange
GetLastError
LocalAlloc
VerifyVersionInfoW
SetFileAttributesA
CreateEventW
WaitForSingleObject
ReleaseMutex
WaitForMultipleObjects
GetTickCount
SetThreadPriority
GetCurrentThread
CreateThread
GetCurrentThreadId
SetLastError
lstrlenW
SetFileAttributesW
CreateDirectoryW
GetFileAttributesW
CompareStringW
lstrcmpiW
lstrcatW
DeleteFileW
CreateFileW
WriteFile
ReadFile
SetFileTime
MoveFileW
SetEndOfFile
GetFileSize
SetFilePointer
GetVolumeInformationW
FindClose
FindFirstFileW
MultiByteToWideChar
RaiseException
GetDriveTypeW
GetEnvironmentVariableW
OutputDebugStringA
GetDiskFreeSpaceA
lstrcatA
GetWindowsDirectoryA
GlobalFree
OutputDebugStringW
CreateMutexW
GetCurrentProcess
ProcessIdToSessionId
GetCurrentProcessId
DuplicateHandle
QueryPerformanceCounter
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InterlockedIncrement
CreateFileA
InterlockedDecrement
DeviceIoControl
DeleteFileA
lstrcpyA
user32
GetMenu
wvsprintfA
MessageBoxA
CloseDesktop
wsprintfA
wsprintfW
MsgWaitForMultipleObjects
SetThreadDesktop
UnregisterClassW
CheckMenuItem
DefWindowProcW
PostQuitMessage
DestroyWindow
advapi32
RegDeleteValueW
RegQueryValueExA
OpenThreadToken
RevertToSelf
SetThreadToken
OpenProcessToken
DuplicateToken
GetTokenInformation
RegCreateKeyExW
GetLengthSid
RegCloseKey
RegOpenKeyA
RegCreateKeyExA
GetFileSecurityW
GetUserNameA
RegOpenKeyExW
RegQueryValueExW
RegOpenKeyExA
Sections
0 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 90B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 422KB - Virtual size: 421KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ