Static task
static1
Behavioral task
behavioral1
Sample
1b3eb05406db7d5501cc5726e27a8db1_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
1b3eb05406db7d5501cc5726e27a8db1_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1b3eb05406db7d5501cc5726e27a8db1_JaffaCakes118
-
Size
151KB
-
MD5
1b3eb05406db7d5501cc5726e27a8db1
-
SHA1
9b77346ef2a27cea1e3bc15d2703c5a338dc2558
-
SHA256
d97bf0f2047d5281fbc8b105f32b3941b02224e6b03386de3892f1108aa86bab
-
SHA512
ebadf6cfef43beabc94aa332c23fb5136592720c61493326ab0716e31381a3cb28087f1ed063db10404f7d53c6498239a6f692849956bcf7c972d38b9e63d994
-
SSDEEP
3072:QykVD1BSqao9c3HwsanTdgyOxsP+f+Ef6yXwL6VRk87e:iSqjc3HsTaxoqv7a6VH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1b3eb05406db7d5501cc5726e27a8db1_JaffaCakes118
Files
-
1b3eb05406db7d5501cc5726e27a8db1_JaffaCakes118.exe windows:4 windows x86 arch:x86
60efa693a19725b0dd128cb84a9a313f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExA
RegCloseKey
LookupPrivilegeValueA
OpenProcessToken
RegOpenKeyExA
kernel32
SearchPathA
GetModuleFileNameA
GetModuleHandleA
lstrcatA
ShowConsoleCursor
GetFileSize
Sleep
RemoveDirectoryA
lstrlenA
GetShortPathNameA
CopyFileA
lstrcpynA
lstrcpyA
GetUserDefaultUILanguage
MoveFileA
GetFullPathNameA
SetFileAttributesA
lstrcatW
CreateTimerQueue
WaitForSingleObjectEx
SetEnvironmentVariableW
SetLocalTime
FlushConsoleInputBuffer
GetCurrentConsoleFont
WaitForMultipleObjects
QueryPerformanceCounter
ExitProcess
GetConsoleCP
LocalReAlloc
WaitCommEvent
IsDBCSLeadByteEx
GetSystemTimeAsFileTime
SetThreadAffinityMask
GetModuleHandleA
CreateTimerQueueTimer
GetCurrentThreadId
GlobalMemoryStatus
SetConsolePalette
ClearCommError
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
user32
SendDlgItemMessageA
ShowWindow
CreateWindowExA
GetDlgItemTextA
SetWindowTextA
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 130KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jclwplc Size: 4KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cnhctsx Size: - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
anbujzz Size: - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vtanbrq Size: - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xuddjfd Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE