Static task
static1
Behavioral task
behavioral1
Sample
24a700a44660c16c8f3e370089c8d485_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
24a700a44660c16c8f3e370089c8d485_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
24a700a44660c16c8f3e370089c8d485_JaffaCakes118
-
Size
53KB
-
MD5
24a700a44660c16c8f3e370089c8d485
-
SHA1
93c93e5a5a3657ae71ac9bb774eea5b18c5e7f3a
-
SHA256
a4c231f62111454d3df5bb3ad7b8996111c4d80f7b16b4a019779857b5be5cba
-
SHA512
2393635b0f12d583331f8d8a2df29532c48b46925f1faccdaafe56c61e288829a945b5a580ce389d1c46ddd501b787164f7973d93f523e84fd6068449e56bf65
-
SSDEEP
768:/yTgom2qYVTnHh0TXqnReC0uCY3FuRvW4+5k/bCc0jHYhVKo3jS/YF:x0Hh0T6nRIqU9u5k+kMo3jeYF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24a700a44660c16c8f3e370089c8d485_JaffaCakes118
Files
-
24a700a44660c16c8f3e370089c8d485_JaffaCakes118.exe windows:4 windows x86 arch:x86
1877d987a2169a20cf7f614382691f2e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ChangeServiceConfigA
CreateServiceA
InitializeSecurityDescriptor
LookupAccountSidA
OpenProcessToken
QueryServiceConfig2A
RegOpenKeyExA
RegQueryValueExA
RegisterServiceCtrlHandlerA
kernel32
CloseHandle
CompareStringA
CopyFileA
CreateProcessA
CreateThread
DeleteCriticalSection
DeleteFileA
DeviceIoControl
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
ExpandEnvironmentStringsA
FindNextFileA
FindResourceA
FreeEnvironmentStringsA
FreeLibrary
GetConsoleMode
GetConsoleOutputCP
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStringsA
GetEnvironmentVariableA
GetExitCodeProcess
GetLastError
GetLocaleInfoA
GetPrivateProfileSectionA
GetPrivateProfileStructA
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetSystemTimeAsFileTime
GetTempFileNameA
GetTimeZoneInformation
GetVersion
GetVersionExA
GlobalHandle
GlobalLock
HeapAlloc
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsBadWritePtr
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
LockResource
Module32First
Module32Next
MoveFileExA
MulDiv
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
ReadProcessMemory
ReleaseMutex
RemoveDirectoryA
ResetEvent
ResumeThread
SetCurrentDirectoryA
SetEvent
SetFilePointer
SetFileTime
SetStdHandle
SystemTimeToFileTime
UnmapViewOfFile
VirtualAlloc
WideCharToMultiByte
WriteConsoleA
WriteFile
lstrcatA
lstrcpyA
lstrcpynA
user32
CallNextHookEx
CharUpperA
CheckMenuItem
CheckRadioButton
ClientToScreen
CopyRect
DrawTextA
EnableMenuItem
FindWindowA
GetDlgCtrlID
GetSysColor
GetSystemMenu
GetSystemMetrics
GetWindowPlacement
GetWindowThreadProcessId
IsChild
IsIconic
MessageBoxA
PeekMessageA
RegisterClassExA
RegisterClipboardFormatA
RegisterWindowMessageA
SendMessageA
SetForegroundWindow
TrackPopupMenu
UnregisterClassA
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.INIT Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ