Static task
static1
Behavioral task
behavioral1
Sample
1902bccbcfb9831f3c94965ccdb20d28_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
1902bccbcfb9831f3c94965ccdb20d28_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
1902bccbcfb9831f3c94965ccdb20d28_JaffaCakes118
-
Size
546KB
-
MD5
1902bccbcfb9831f3c94965ccdb20d28
-
SHA1
9e4e9bcf96043c697c4dac44b24ae14f89155418
-
SHA256
27da84a1935c83dc845c304545b3701a7a2cea3ba975c0ad280bb0f981100218
-
SHA512
d2821d64b93f8d29e7794c2e6fb6f57f75fa8384bb6ae87f5fc94c653fd3e981fce5bafe5728b39fdf6df1d681af95e466bb62fc0d118dbc3c84c96bb5a4edf2
-
SSDEEP
12288:MHc3ymTbvu+QjfPdG3JZ4CXGyimOUPYpDkrssQ+vNtTirdq:MHc1TSzLdG5eyi0KHt+HTEdq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1902bccbcfb9831f3c94965ccdb20d28_JaffaCakes118
Files
-
1902bccbcfb9831f3c94965ccdb20d28_JaffaCakes118.exe windows:4 windows x86 arch:x86
0b9cec58acd1f743bcbfa05c9aef50c5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2915
ord665
ord1979
ord6385
ord5186
ord354
ord537
ord825
ord5442
ord5773
ord800
ord5856
ord4278
ord2764
ord535
ord941
ord4129
ord533
ord5194
ord3811
ord3337
ord6407
ord1997
ord798
ord4202
ord823
ord356
ord2770
ord2818
ord1980
ord668
ord540
ord5683
ord4277
ord858
ord6874
ord860
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
free
malloc
_vsnprintf
_except_handler3
sprintf
_splitpath
getenv
__CxxFrameHandler
_ftol
ceil
memmove
__setusermatherr
_stricmp
kernel32
WinExec
GetCurrentProcess
GetLastError
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcessId
CloseHandle
lstrcpyA
lstrlenA
lstrcatA
FindNextFileA
DeleteFileA
GetSystemDirectoryA
CreateDirectoryA
FindFirstFileA
FindClose
GetModuleFileNameA
FindResourceA
LoadResource
LockResource
SizeofResource
VirtualAlloc
VirtualFree
OpenProcess
lstrcmpiA
LocalFree
LocalAlloc
CreateProcessA
GetStartupInfoA
OutputDebugStringA
GetTempFileNameA
GetTempPathA
GetSystemWindowsDirectoryA
ExitProcess
SetProcessPriorityBoost
SetThreadPriority
GetModuleHandleA
GetVersionExA
CreateMutexA
TerminateProcess
GetShortPathNameA
GetEnvironmentVariableA
SetPriorityClass
GetCurrentThread
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
FreeSid
SetSecurityInfo
AddAccessDeniedAce
InitializeAcl
GetLengthSid
GetTokenInformation
AllocateAndInitializeSid
DeregisterEventSource
ReportEventA
RegisterEventSourceA
shell32
SHChangeNotify
ShellExecuteExA
Sections
.text Size: 76KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 440KB - Virtual size: 437KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ