Static task
static1
Behavioral task
behavioral1
Sample
36a076d65cdb5fadb4c8e876022a946d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
36a076d65cdb5fadb4c8e876022a946d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
36a076d65cdb5fadb4c8e876022a946d_JaffaCakes118
-
Size
528KB
-
MD5
36a076d65cdb5fadb4c8e876022a946d
-
SHA1
f9b681503a92a4617fad8569e2ae56b4436a077a
-
SHA256
7bec94924d0c47b8a1099a3397242309350a0c5f763f4c20a1f2a342ee3a339f
-
SHA512
a7bab18aa7c9dff7987e03c3a03ded97cd76eee94ecccd46ddc9acff77ec4011da21fb2637b3a9ccd6a32f444738946e96495e16fe910a2f80ad83034f55750a
-
SSDEEP
12288:78wT2X3jXTMvuEIzkogaNTYvuM8+1SQ2G:7BT2jXTvEIzkojNTjMvAzG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36a076d65cdb5fadb4c8e876022a946d_JaffaCakes118
Files
-
36a076d65cdb5fadb4c8e876022a946d_JaffaCakes118.exe windows:4 windows x86 arch:x86
edadd4665762634631f087d291c4d0bf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2763
ord6662
ord3337
ord533
ord5194
ord798
ord3811
ord6407
ord1997
ord1601
ord356
ord2770
ord1980
ord668
ord6385
ord941
ord5856
ord825
ord4129
ord540
ord5683
ord4277
ord4278
ord858
ord6874
ord860
ord2818
ord535
ord536
ord2915
ord5572
ord354
ord5186
ord665
ord5773
ord5442
ord1979
ord537
ord4202
ord2764
ord800
ord823
msvcrt
__dllonexit
_ftol
ceil
memmove
clearerr
strerror
fputc
fseek
fflush
free
fclose
fread
fwrite
malloc
_errno
fopen
_fdopen
fprintf
ftell
_stricmp
_strnicmp
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_strcmpi
printf
abs
strcmp
time
srand
rand
_vsnprintf
_except_handler3
_mbsicmp
memcmp
wcslen
_wcsicmp
_splitpath
sprintf
getenv
strcat
memset
strcpy
__CxxFrameHandler
memcpy
strstr
strlen
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
kernel32
CreateFileA
GetFileSize
ReadFile
FindResourceA
LoadResource
LockResource
SizeofResource
ExitProcess
CreateToolhelp32Snapshot
Process32First
GetSystemDirectoryA
GetCurrentProcessId
CloseHandle
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
GetSystemInfo
OutputDebugStringA
CreateRemoteThread
GetProcAddress
FindClose
FindFirstFileA
CreateDirectoryA
CreateProcessA
GetStartupInfoA
CopyFileA
WriteFile
MoveFileExA
GetTempFileNameA
GetSystemWindowsDirectoryA
DeleteFileA
MultiByteToWideChar
GetCurrentProcess
UnmapViewOfFile
ReadProcessMemory
MapViewOfFile
CreateFileMappingA
WriteProcessMemory
VirtualProtectEx
VirtualQueryEx
Process32Next
GetModuleFileNameA
GlobalAlloc
LoadLibraryExA
GlobalFree
GetExitCodeThread
TerminateThread
CreateThread
GetLocalTime
SetLocalTime
GetVersionExA
IsBadReadPtr
LocalFree
GetFileInformationByHandle
VirtualAlloc
VirtualFree
CreatePipe
GetStdHandle
GetVersion
Sleep
lstrcatA
LoadLibraryA
FreeLibrary
lstrlenA
VirtualAllocEx
GetModuleHandleA
OpenProcess
user32
GetWindowRect
SetCursorPos
mouse_event
SendMessageA
FindWindowA
PostMessageA
FindWindowExA
MessageBoxA
advapi32
AdjustTokenPrivileges
OpenProcessToken
DeregisterEventSource
ReportEventA
RegisterEventSourceA
CloseServiceHandle
StartServiceA
RegCloseKey
RegSetValueExA
RegOpenKeyA
CreateServiceA
OpenSCManagerA
SetServiceStatus
RegisterServiceCtrlHandlerA
RegEnumValueA
RegOpenKeyExA
SetSecurityInfo
SetEntriesInAclA
GetUserNameA
GetSecurityInfo
LookupPrivilegeValueA
shell32
ShellExecuteA
msvcp60
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADHD@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@N@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@P6AAAV01@AAV01@@Z@Z
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
Sections
.text Size: 120KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 368KB - Virtual size: 364KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
520mmym Size: 88B - Virtual size: 88B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ