Static task
static1
Behavioral task
behavioral1
Sample
244d41ce5abd742adfaf43ec5a480c5c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
244d41ce5abd742adfaf43ec5a480c5c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
244d41ce5abd742adfaf43ec5a480c5c_JaffaCakes118
-
Size
192KB
-
MD5
244d41ce5abd742adfaf43ec5a480c5c
-
SHA1
2d2f23c9fecc7adad74772d3c2f3f4c9e3440f56
-
SHA256
d30b03a9e5b8a39d6b297dec87354920906efd0bfab43880e5dbd8414f6caa4f
-
SHA512
61c18241dd59c4d29d1a9818136df6bf8e70f9d4a06f0b7927a31d7832be5be977526c4da4f6632878f70429e10e996ca000274efa4c7aa48839b68e41b0f404
-
SSDEEP
3072:2vTpvsekm6WyVpenUz0bR96zaeRjP5B1EY9yBRtV8mmw2pD2P:216WyVknU4v6zaeRjRBQto2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 244d41ce5abd742adfaf43ec5a480c5c_JaffaCakes118
Files
-
244d41ce5abd742adfaf43ec5a480c5c_JaffaCakes118.exe windows:4 windows x86 arch:x86
f4c2238e2cc4a6d52bcbcac57aeb3911
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
SetFileSecurityA
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
EqualSid
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupAccountNameA
GetFileSecurityA
RegCloseKey
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
ChangeServiceConfig2A
CloseServiceHandle
DeleteService
CreateServiceA
OpenSCManagerA
ControlService
StartServiceA
GetServiceKeyNameA
GetUserNameA
msvcrt
_controlfp
__set_app_type
__p__fmode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
tolower
toupper
malloc
free
strstr
strncpy
_CxxThrowException
__CxxFrameHandler
strcmp
??3@YAXPAX@Z
memcpy
??2@YAPAXI@Z
_ftol
srand
rand
strlen
strcpy
memset
_except_handler3
strcat
_strnicmp
_strlwr
_stricmp
_strupr
_itoa
strchr
strncat
__p__commode
kernel32
LoadLibraryA
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
GetStartupInfoA
CreateToolhelp32Snapshot
Process32First
GetCurrentProcessId
Process32Next
SetFileAttributesA
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
SetUnhandledExceptionFilter
OpenEventA
ExpandEnvironmentStringsA
GetShortPathNameA
GetFileAttributesA
CreateEventA
WaitForSingleObject
GetModuleFileNameA
lstrcmpiA
GetSystemDirectoryA
GetTickCount
FindFirstFileA
FindNextFileA
CreateFileA
WriteFile
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CloseHandle
MoveFileA
GetCurrentDirectoryA
HeapFree
Sleep
GetProcAddress
GetModuleHandleA
HeapAlloc
GetProcessHeap
GetLastError
lstrcatA
ExitProcess
CreateDirectoryA
SetEnvironmentVariableA
lstrlenA
lstrcpyA
GetWindowsDirectoryA
GetTempPathA
user32
wsprintfA
CharNextA
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ