Static task
static1
Behavioral task
behavioral1
Sample
250d9604838a73198a9086ec7d296e71_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
250d9604838a73198a9086ec7d296e71_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
250d9604838a73198a9086ec7d296e71_JaffaCakes118
-
Size
654KB
-
MD5
250d9604838a73198a9086ec7d296e71
-
SHA1
e7f6f07e5dbcee311d25943c51834d5438ffca3d
-
SHA256
4f7eed46d605c97bd4353ea53928dbbb91c8b9ae11bb1d89531237ebb2f5c92d
-
SHA512
256ed992b73a950d7983520466eb966a616720f717cebaa8897abfa50db152269ddda0951b6b2c1789f151a13668a78dab7a15a2a11b63dbf68d86390985725a
-
SSDEEP
12288:GqjWFAssQFitkTJ6q/GWCtuTtvdZuyDPOs+9WtmEj6zx:GqjWFJrF2kE2CwTpdZLDPObctWt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 250d9604838a73198a9086ec7d296e71_JaffaCakes118
Files
-
250d9604838a73198a9086ec7d296e71_JaffaCakes118.exe windows:4 windows x86 arch:x86
4fa6c0a14b2f90f83e884c93e5f204e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetFullPathNameA
GetModuleHandleA
FreeLibraryAndExitThread
GetStringTypeExW
WriteConsoleOutputW
GetLocaleInfoW
PeekNamedPipe
GetLogicalDriveStringsA
SearchPathW
CreateMutexW
SetErrorMode
CreateEventA
RaiseException
GetHandleInformation
ScrollConsoleScreenBufferA
lstrcpynA
GetEnvironmentVariableW
GetLongPathNameA
SwitchToFiber
FormatMessageA
VirtualQuery
GetThreadContext
GetDiskFreeSpaceW
GetBinaryTypeA
MultiByteToWideChar
GetPrivateProfileStringA
EnumResourceLanguagesW
FlushFileBuffers
SetNamedPipeHandleState
GetCurrentDirectoryW
GenerateConsoleCtrlEvent
GetThreadPriority
GetBinaryTypeW
GetDateFormatA
_lopen
SetCommMask
ReadFile
FindResourceExA
LocalLock
EraseTape
WriteFile
LoadLibraryExA
EnumDateFormatsW
lstrcmpA
_llseek
ConnectNamedPipe
VirtualProtect
GetSystemTimeAsFileTime
GlobalUnlock
SetConsoleMode
GetOEMCP
FindCloseChangeNotification
FindFirstFileA
FreeResource
CreateDirectoryExA
OpenFile
PeekConsoleInputW
FillConsoleOutputCharacterA
GetProcessHeap
CreatePipe
GetSystemTimeAdjustment
SetProcessWorkingSetSize
IsBadWritePtr
AreFileApisANSI
GetDiskFreeSpaceExA
LocalAlloc
LCMapStringA
ExitThread
FindFirstFileExW
GlobalFree
GlobalFindAtomW
FindFirstFileW
WriteProcessMemory
QueryDosDeviceA
GetCurrentProcess
Beep
ExitProcess
user32
GetDC
CharNextExA
SetWindowLongA
CopyImage
LoadAcceleratorsW
DefDlgProcW
GetUpdateRect
SetTimer
IsCharAlphaA
SendMessageTimeoutW
GetCapture
SetProcessWindowStation
SetWindowTextW
SetScrollPos
SystemParametersInfoW
UnregisterDeviceNotification
gdi32
SetLayout
EnumFontsA
CreateEnhMetaFileA
SetEnhMetaFileBits
LineDDA
SelectClipPath
SetBitmapDimensionEx
CreatePenIndirect
CreateHalftonePalette
SetTextAlign
GetBkColor
GetTextFaceW
comdlg32
PrintDlgA
ReplaceTextA
FindTextA
advapi32
RegSetValueW
MakeSelfRelativeSD
CloseEventLog
ChangeServiceConfigW
SetKernelObjectSecurity
ImpersonateNamedPipeClient
OpenServiceW
RegOpenKeyA
RegConnectRegistryW
GetServiceDisplayNameA
SetSecurityDescriptorSacl
LookupAccountNameW
CryptGetKeyParam
QueryServiceStatus
CreateServiceA
CryptEncrypt
SetTokenInformation
RegisterEventSourceA
DestroyPrivateObjectSecurity
shell32
FindExecutableW
DragQueryPoint
ole32
CreateOleAdviseHolder
CoGetTreatAsClass
oleaut32
VariantCopy
SysFreeString
VariantChangeType
SysAllocStringLen
SafeArrayCreate
SafeArrayGetLBound
QueryPathOfRegTypeLi
SafeArrayGetElement
comctl32
ImageList_Draw
shlwapi
StrToIntExW
PathIsDirectoryW
StrRChrW
SHRegQueryUSValueW
Sections
.text Size: 21KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 316KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ