Static task
static1
Behavioral task
behavioral1
Sample
26fa4da03f2ed42b6541948906bbc75a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
26fa4da03f2ed42b6541948906bbc75a_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
26fa4da03f2ed42b6541948906bbc75a_JaffaCakes118
-
Size
757KB
-
MD5
26fa4da03f2ed42b6541948906bbc75a
-
SHA1
45d875b93c5e9e6d525dc60c066d064c3632d077
-
SHA256
8300a5d9119dfd155d50e613b147381f1d888823712cc58d29e952cfe1fed32c
-
SHA512
93861829ffaffec5bd0ca5364675f68c4de7c98ba7e519fa28b5637c9a82c9f65743028aafe86c67782e1e6ff0f6549f9e0566fb3a0eccb0f7e30588a8b93a4e
-
SSDEEP
12288:c7iDMd3qIyAT/JvI/bDXtf3xXTA92n9pNkoTsgjMft75Di6d5fomhTXU7Zu9:c2DM8IBTRIT5VTAs9IoZY7g6d5fo5k9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26fa4da03f2ed42b6541948906bbc75a_JaffaCakes118
Files
-
26fa4da03f2ed42b6541948906bbc75a_JaffaCakes118.exe windows:5 windows x86 arch:x86
4fec4676cc8dd20b44ac4f6849c12c5e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
EndPaint
DestroyWindow
RegisterClassExA
SendDlgItemMessageA
FillRect
wsprintfA
GetClientRect
ExitWindowsEx
BeginPaint
SetWindowLongA
MessageBoxA
GetWindowLongA
CreateWindowExA
EndDialog
DefWindowProcA
RedrawWindow
ShowWindow
SystemParametersInfoA
GetSystemMetrics
UpdateWindow
DialogBoxParamA
gdi32
DeleteObject
CreateSolidBrush
advapi32
OpenServiceA
CreateServiceA
StartServiceA
DeleteService
CloseServiceHandle
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyA
FreeSid
AllocateAndInitializeSid
ReportEventA
LookupPrivilegeValueA
DeregisterEventSource
OpenProcessToken
RegisterEventSourceA
OpenSCManagerA
kernel32
RaiseException
GetConsoleMode
HeapReAlloc
LoadLibraryW
FlushFileBuffers
GetStringTypeW
SetStdHandle
HeapSize
WriteConsoleW
SetEndOfFile
GetProcessHeap
CreateFileW
GetConsoleCP
TerminateProcess
GetCurrentProcess
CreateDirectoryA
GetLastError
GetProcAddress
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
CreateMutexA
GetVersionExA
GetEnvironmentVariableA
Sleep
CloseHandle
DeviceIoControl
CreateFileA
DeleteFileA
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetSystemTimeAsFileTime
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetModuleHandleW
ExitProcess
DecodePointer
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
HeapCreate
WriteFile
GetModuleFileNameW
RtlUnwind
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
IsProcessorFeaturePresent
SetFilePointer
ReadFile
Sections
.text Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 34KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ