Static task
static1
Behavioral task
behavioral1
Sample
3448af495b4581ef1cd0b28bc6ca72be_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3448af495b4581ef1cd0b28bc6ca72be_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3448af495b4581ef1cd0b28bc6ca72be_JaffaCakes118
-
Size
108KB
-
MD5
3448af495b4581ef1cd0b28bc6ca72be
-
SHA1
e4c2868c7019a35165aa0d897b3e0aaa44ea29e8
-
SHA256
f1731270f7827904335d524e765ef7ed11f481a51eea48f486e0fb03d42190a0
-
SHA512
c3e6a0117d2b4abb9612016c03e1ce059c6cd9842ae15a5210189f83cadd7cf7e32bff1a3ff25dbb6a42468e7fc6d8ee4bb951e8387f7d2fe67ee108d6778839
-
SSDEEP
1536:Qkxwu+kiZz/lJsNZ+udMNUY2Sng69QHI8x2ULGhaEUX1TAGl2:Qkq/kU/lJNf2S+IeBXyGl2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3448af495b4581ef1cd0b28bc6ca72be_JaffaCakes118
Files
-
3448af495b4581ef1cd0b28bc6ca72be_JaffaCakes118.exe windows:4 windows x86 arch:x86
a62653e0554fd087ad9fa4546e2066e2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetWindowsDirectoryA
FreeLibrary
LoadLibraryA
CreateProcessA
CopyFileA
GetFileAttributesA
DeviceIoControl
WideCharToMultiByte
GetSystemTimeAsFileTime
ReadFile
InterlockedDecrement
SetEndOfFile
SetFileAttributesA
DeleteFileA
MultiByteToWideChar
SetEvent
CreateEventA
WaitForSingleObject
CloseHandle
SetConsoleCtrlHandler
GetModuleHandleA
GetProcAddress
Sleep
GetModuleFileNameA
AllocConsole
GetVersionExA
GetStdHandle
GlobalAlloc
GlobalFree
FormatMessageA
LocalFree
GetLastError
lstrlenA
GetLocaleInfoA
GetSystemInfo
VirtualProtect
SetFilePointer
FlushFileBuffers
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
IsBadCodePtr
IsBadReadPtr
RtlUnwind
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
GetFileType
RaiseException
GetCommandLineA
ExitProcess
CreateDirectoryA
HeapFree
HeapAlloc
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
DeleteCriticalSection
GetACP
GetOEMCP
GetCPInfo
SetHandleCount
GetStartupInfoA
InitializeCriticalSection
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
HeapReAlloc
HeapSize
WriteFile
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
VirtualAlloc
IsBadWritePtr
InterlockedExchange
VirtualQuery
InterlockedIncrement
user32
DefWindowProcA
CreateWindowExA
RegisterClassA
DestroyWindow
advapi32
OpenServiceA
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
StartServiceA
RegDeleteValueA
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegDeleteKeyA
RegCreateKeyA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
SetServiceStatus
GetUserNameA
LookupAccountNameA
IsValidSid
GetLengthSid
CopySid
ole32
CoInitialize
CoGetClassObject
StringFromCLSID
CoUninitialize
oleaut32
VariantClear
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 216B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ