Static task
static1
Behavioral task
behavioral1
Sample
1bb100c650772e3fadbae19b93a2ee8a_JaffaCakes118.exe
Resource
win7-20240611-en
General
-
Target
1bb100c650772e3fadbae19b93a2ee8a_JaffaCakes118
-
Size
155KB
-
MD5
1bb100c650772e3fadbae19b93a2ee8a
-
SHA1
3ef34d341904a089f910576ce32a06977bf9c1bd
-
SHA256
a3aea6e5003f78d6cd025dd60f6cb61d3fd3a588a352866631ad83ae64d10a9e
-
SHA512
16c8ab9c2c745544554b582a34b01e892d5a7f338cec40c0fdd89cdc32259dc5c1b69bf0dd961a296d75983ed38c86d415303ec1a12aaae495b65a052a5412b8
-
SSDEEP
3072:RGkiRtyqKIjdB0gIiq7FFRFl2O/6du+U8bwhji+4NZ:RGuqDBig3oF3T/6dxU8bkENZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1bb100c650772e3fadbae19b93a2ee8a_JaffaCakes118
Files
-
1bb100c650772e3fadbae19b93a2ee8a_JaffaCakes118.exe windows:5 windows x86 arch:x86
6210e4ec0b2345935c645f2ba7ecf181
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapFree
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
InitializeCriticalSection
VirtualAlloc
HeapReAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RtlUnwind
VirtualProtect
GetSystemInfo
VirtualQuery
CompareStringA
CompareStringW
SetEnvironmentVariableA
TlsGetValue
TlsSetValue
GetCurrentThreadId
SetLastError
TlsFree
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetModuleHandleA
GetLastError
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetModuleFileNameA
GetStdHandle
WriteFile
GetProcAddress
ExitProcess
GetVersionExA
CloseHandle
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetTempPathA
CreateMutexA
CreateDirectoryA
GetFileAttributesA
CopyFileA
SetFileAttributesA
DeleteFileA
GetCurrentProcess
RemoveDirectoryA
FindClose
FindNextFileA
FindFirstFileA
MoveFileA
GetWindowsDirectoryA
GetDiskFreeSpaceExA
FreeLibrary
SetFilePointer
SetStdHandle
FlushFileBuffers
ReadFile
CreateFileA
SetEndOfFile
GetProcessHeap
GetSystemDirectoryA
GetCommandLineA
GetStartupInfoA
advapi32
RegEnumKeyExA
RegCreateKeyExA
RegDeleteValueA
RegGetKeySecurity
GetLengthSid
InitializeAcl
AddAccessAllowedAce
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegSetKeySecurity
RegQueryValueExA
RegOpenKeyExA
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
EqualSid
FreeSid
RegCloseKey
RegSetValueExA
user32
SetWindowTextA
SetDlgItemTextA
DialogBoxParamA
EndDialog
MessageBoxA
cfgmgr32
CM_Locate_DevNodeA
CM_Create_DevNodeA
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
setupapi
SetupDiGetINFClassA
SetupDiGetClassDevsA
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
SetupDiCreateDeviceInfoList
SetupDiCreateDeviceInfoA
SetupDiSetDeviceRegistryPropertyA
SetupDiEnumDeviceInfo
SetupFindNextLine
SetupFindFirstLineA
SetupGetStringFieldA
SetupCloseInfFile
SetupOpenInfFileA
SetupCopyOEMInfA
SetupIterateCabinetA
SetupDiCallClassInstaller
Sections
.text Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE