Static task
static1
Behavioral task
behavioral1
Sample
19c2843eb9b1427673ab546aa3dca374_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
19c2843eb9b1427673ab546aa3dca374_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
19c2843eb9b1427673ab546aa3dca374_JaffaCakes118
-
Size
10.1MB
-
MD5
19c2843eb9b1427673ab546aa3dca374
-
SHA1
08178736df6f0bd71938814794d772ec5ad3a318
-
SHA256
556df19dd075d0b76a0645c12421bb90d799fa107de75548411c69b3ebea049f
-
SHA512
db57a1ebf23023a3934e42b5ec3b09a5d9df10f8fcdcfb22fde10957f804ed23a3346cf9f5daccc3a994c4a2aa6954097a02bf971cb7046306020f45dd954712
-
SSDEEP
3072:nxekF/v6+veTWfQaQxSHMVr9vEddXT4hgH4h7WAk4/5DGKm:nIav6+2sArpkdXTiNqAk6Du
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19c2843eb9b1427673ab546aa3dca374_JaffaCakes118
Files
-
19c2843eb9b1427673ab546aa3dca374_JaffaCakes118.exe windows:4 windows x86 arch:x86
00d3407cf5fedfaeed22dab6b1cf9e07
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
ExitProcess
WinExec
CreateThread
GetCurrentThreadId
CreateDirectoryA
HeapAlloc
SetUnhandledExceptionFilter
GetWindowsDirectoryA
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
HeapFree
GetLastError
lstrcpyA
SetLastError
GetTempPathA
FindResourceA
lstrcmpiA
LoadResource
GetSystemDirectoryA
lstrcatA
FindFirstFileA
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
FreeResource
MoveFileA
DeleteFileA
LoadLibraryA
GetProcAddress
GetModuleFileNameA
CreateFileA
SetFilePointer
ReadFile
OutputDebugStringA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
lstrlenA
Sleep
GetFileAttributesA
user32
LoadCursorA
RegisterClassExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
PostQuitMessage
wsprintfA
LoadIconA
GetDesktopWindow
GetTopWindow
GetWindowRect
WindowFromPoint
CreateWindowExA
GetCursorPos
IsWindow
SetForegroundWindow
GetWindow
GetClassNameA
GetWindowTextA
PostThreadMessageA
SendMessageA
GetInputState
SetCursorPos
mouse_event
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
GetUserNameA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CreateServiceA
OpenSCManagerA
SetFileSecurityA
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
EqualSid
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityA
LookupAccountNameA
StartServiceA
OpenServiceA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
CloseServiceHandle
msvcrt
_except_handler3
rand
strchr
strstr
realloc
malloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__fmode
__set_app_type
_controlfp
__p__commode
??2@YAPAXI@Z
memset
strlen
??3@YAXPAX@Z
memcpy
__CxxFrameHandler
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ