Static task
static1
Behavioral task
behavioral1
Sample
2192922783c755a99f7c92d327472527_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
2192922783c755a99f7c92d327472527_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
2192922783c755a99f7c92d327472527_JaffaCakes118
-
Size
267KB
-
MD5
2192922783c755a99f7c92d327472527
-
SHA1
f1a277af40e2f27a787c7cbf9aa9c23f525f464b
-
SHA256
4f8dab17bff65eb110a076c93b1c71767728215836bed1a31682af0db5ed06d5
-
SHA512
f47cc6368a95ca86f715197367183269a4183ca1a66ee264724a494da1c8a6ac2b8ff0a476563336bae437bf1489334b544d464df927516daea4be64ed0cce74
-
SSDEEP
6144:5ryGpmyzl1SsiZoylou4jl08RWQYaxkLdPUF:5CUl1zKjEjldRW1dZe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2192922783c755a99f7c92d327472527_JaffaCakes118
Files
-
2192922783c755a99f7c92d327472527_JaffaCakes118.exe windows:4 windows x86 arch:x86
f3d2e0708d745f86b71bde118fdbfa07
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
LoadLibraryA
GetModuleFileNameA
GetLastError
GetACP
MultiByteToWideChar
GetModuleHandleA
GetCurrentProcess
GetVersionExA
IsBadReadPtr
ExitProcess
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
HeapCreate
TlsAlloc
GetOEMCP
GetCPInfo
GetStartupInfoA
GetEnvironmentStringsW
InitializeCriticalSection
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
GetSystemInfo
BeginUpdateResourceW
GetProcAddress
user32
MessageBoxA
advapi32
RegQueryValueExA
RegCloseKey
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
RegOpenKeyExA
scecli
SceStartTransaction
SceCopyBaseProfile
SceUpdateObjectInfo
SceConfigureConvertedFileSecurity
SceSvcSetInfo
SceRollbackTransaction
gptext
DllRegisterServer
Sections
CODE Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.r Size: 4KB - Virtual size: 777KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zAIwxy Size: 3KB - Virtual size: 535KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 99KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xBbrj Size: 4KB - Virtual size: 909KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 122KB - Virtual size: 177KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.al Size: 2KB - Virtual size: 434KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ