Static task
static1
Behavioral task
behavioral1
Sample
19b6ec3b86ff4ba8513e785b86bc6230_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
19b6ec3b86ff4ba8513e785b86bc6230_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
19b6ec3b86ff4ba8513e785b86bc6230_JaffaCakes118
-
Size
172KB
-
MD5
19b6ec3b86ff4ba8513e785b86bc6230
-
SHA1
d868f4b0b13c131abdfba4ea831b0ef96648a615
-
SHA256
01e06115f9560caba27ae50973b61d6169b491e40090efe0874d1c6a1fafc5a2
-
SHA512
db288421c00257dc952c87d967a22bbeba2d4e838b9aacb8a43caad8f613303f0151663cf314a90eb257bf235bf905067a72a268f52a542ae704eb7f34d3341b
-
SSDEEP
1536:WnFG41KbjitVE6RC5z5v1Wx6IyM9b/H24huSXTVDGNZEG44oMGvpucs/X:b5joE6R211G6I1BH3XYNZ24oHRu7/X
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19b6ec3b86ff4ba8513e785b86bc6230_JaffaCakes118
Files
-
19b6ec3b86ff4ba8513e785b86bc6230_JaffaCakes118.exe windows:4 windows x86 arch:x86
ce074c0c92fca9da23a7c222a6a4f48e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
GetVersionExA
WriteFile
GetFileAttributesExA
WideCharToMultiByte
FreeLibrary
TerminateProcess
WaitForSingleObject
CreateProcessA
GetStartupInfoA
GetModuleHandleA
OpenProcess
GetCurrentProcess
GetProcAddress
DuplicateHandle
GetLastError
CloseHandle
GetSystemDirectoryA
GetModuleFileNameA
WinExec
CreateFileA
LoadLibraryA
SetFileTime
user32
GetMessageA
RegisterClassExA
ShowWindow
TranslateMessage
DefWindowProcA
PostQuitMessage
SendMessageTimeoutA
RegisterWindowMessageA
GetClassNameA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
GetDesktopWindow
DispatchMessageA
CreateWindowExA
EnumWindows
advapi32
DeleteService
OpenSCManagerA
StartServiceA
OpenServiceA
ConvertSidToStringSidA
LookupAccountNameA
GetUserNameA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
CreateServiceA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
msvcrt
wcslen
_stricmp
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
__CxxFrameHandler
strstr
strchr
atoi
_strlwr
fclose
fflush
fwrite
fopen
srand
time
sprintf
rand
??3@YAXPAX@Z
??2@YAPAXI@Z
_access
shlwapi
SHSetValueA
SHGetValueA
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
udata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ