Static task
static1
Behavioral task
behavioral1
Sample
23859474cf6d4e8f1a7baeb9879fa631_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
23859474cf6d4e8f1a7baeb9879fa631_JaffaCakes118
-
Size
516KB
-
MD5
23859474cf6d4e8f1a7baeb9879fa631
-
SHA1
95c816a1353c1dae86a801b02214674884a33190
-
SHA256
dafc2aa4882037c6bdbb36a5331afaaa44268708447625f19aa42d21bc40ea0f
-
SHA512
90edaae0bea088a93a2ba467eefc8474d3bcbe6c7f7308c2f6b9f2819402d975858b560a05e3da8dbd947680a5e07329dddb0930d849d5687161915ff1bd8fe8
-
SSDEEP
6144:JlMrzUU35MFbWmpCt7sOMcvIqs+HyNbN16oVO+9tQduvKVNkUincard:iOh+FSdPfVO+9tQAisBncO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 23859474cf6d4e8f1a7baeb9879fa631_JaffaCakes118
Files
-
23859474cf6d4e8f1a7baeb9879fa631_JaffaCakes118.exe windows:4 windows x86 arch:x86
87e2be38e38541b503776f2d1d46adaa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WaitForSingleObject
CreateProcessA
SetEvent
GetFileAttributesA
GetTimeFormatA
GetDateFormatA
GetLocalTime
GetStartupInfoA
QueryDosDeviceA
SetFileAttributesA
EnterCriticalSection
CreateEventA
LeaveCriticalSection
ResetEvent
FreeLibrary
LoadLibraryA
GetProcAddress
IsBadWritePtr
DeleteCriticalSection
InitializeCriticalSection
CreateFileA
DeleteFileA
GetModuleHandleA
GetVolumeInformationA
SearchPathA
GetCurrentProcess
GetLastError
GetSystemDirectoryA
GetVersionExA
lstrcmpiA
GetDriveTypeA
GetUserDefaultLangID
GetModuleFileNameA
DeviceIoControl
user32
LoadStringA
EndDialog
ExitWindowsEx
CheckDlgButton
ShowWindow
SetWindowTextA
DialogBoxParamA
IsDlgButtonChecked
EnableWindow
GetDlgItem
SetWindowPos
MessageBoxA
wsprintfA
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegEnumKeyA
RegDeleteValueA
RegEnumKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegDeleteKeyA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
shell32
ShellExecuteExA
comdlg32
GetOpenFileNameA
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
strlen
free
memset
strcpy
malloc
memcpy
??3@YAXPAX@Z
??2@YAPAXI@Z
__CxxFrameHandler
_CxxThrowException
strcat
strrchr
strstr
strcmp
strchr
_itoa
_splitpath
atoi
_strnicmp
_stricmp
strncpy
strncmp
_purecall
strtok
toupper
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
winmm
timeGetTime
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 228KB - Virtual size: 226KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 248KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE