Static task
static1
Behavioral task
behavioral1
Sample
218c1d6ac2997fda92b17a54291b3cb2_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
218c1d6ac2997fda92b17a54291b3cb2_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
218c1d6ac2997fda92b17a54291b3cb2_JaffaCakes118
-
Size
56KB
-
MD5
218c1d6ac2997fda92b17a54291b3cb2
-
SHA1
af2fc7339c0d2c6ef36c86fb6075f28c90cfa875
-
SHA256
2e61380995b741c2b7a7450a2ef38dc79ecb6d40add906ff2e74a51c50cb06f4
-
SHA512
4f83806a7c0004d19583ac4f38d058e8aaaf2b2247484cfdb1f816bf72cbd13214dfbeb84fe280a7ccb31313596c33b498f2c9debc3c31999bbb336a862edec9
-
SSDEEP
1536:cB7EwqsiDNaM4jF+o38e2DKSVkHIM7uPSJbR:Mqs0zQ+o3p0koMKS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 218c1d6ac2997fda92b17a54291b3cb2_JaffaCakes118
Files
-
218c1d6ac2997fda92b17a54291b3cb2_JaffaCakes118.exe windows:4 windows x86 arch:x86
54a9fe283bd923bdd921c4c8b0206eca
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ChangeServiceConfigA
CloseServiceHandle
DeleteService
LockServiceDatabase
OpenServiceA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
kernel32
CreateEventA
CreateFileA
CreateProcessA
CreateThread
DeleteAtom
DeleteFileA
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FindClose
FreeLibrary
GetACP
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetEnvironmentVariableA
GetFileTime
GetFileType
GetLastError
GetModuleHandleA
GetPrivateProfileSectionA
GetPrivateProfileSectionNamesA
GetProcessHeap
GetStdHandle
GetSystemDirectoryA
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetThreadLocale
GetTickCount
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalReAlloc
HeapCreate
HeapFree
HeapSize
InitializeCriticalSection
InterlockedDecrement
IsBadCodePtr
IsBadWritePtr
LoadLibraryA
LocalFree
MapViewOfFile
OpenProcess
QueryPerformanceCounter
ReadFile
ReadProcessMemory
RemoveDirectoryA
RtlUnwind
SetCurrentDirectoryA
SetFilePointer
SetFileTime
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsFree
UnmapViewOfFile
VirtualFree
VirtualQuery
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcmpA
user32
CallNextHookEx
CharUpperA
ClientToScreen
CreateDialogParamA
CreateWindowExA
DestroyWindow
DialogBoxParamA
DrawFocusRect
DrawIcon
EndDialog
EndPaint
GetCapture
GetKeyState
GetWindowDC
GetWindowThreadProcessId
IsIconic
IsWindow
MessageBoxA
PostMessageA
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
SendMessageA
SetWindowLongA
SetWindowTextA
SystemParametersInfoA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 13KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ