Static task
static1
Behavioral task
behavioral1
Sample
379cd21c21f6e46a160ebc9f75481552_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
379cd21c21f6e46a160ebc9f75481552_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
379cd21c21f6e46a160ebc9f75481552_JaffaCakes118
-
Size
168KB
-
MD5
379cd21c21f6e46a160ebc9f75481552
-
SHA1
65b9eb56191026d50f11d5740d149c5dff1bb6c6
-
SHA256
2ba6c8dc220767e3d960d7ccf10c4c1254e06e3a9427035c03f9fc6ba807f740
-
SHA512
7fba6360212433071aba96ab3451b165b71865fa913e2ae4131aba4d346642e8e2be1dd05643e4aef27c2fa8b4a8b9fe6e228774e6bf3727b485a20396380176
-
SSDEEP
1536:vSXPcxyujg4MJplLrUHoaCo0C3MN1OmjGyRBMJJtZw:6cx64MvaBwrjGyMJJtZw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 379cd21c21f6e46a160ebc9f75481552_JaffaCakes118
Files
-
379cd21c21f6e46a160ebc9f75481552_JaffaCakes118.exe windows:1 windows x86 arch:x86
c903e6205c0aab792a66b6baf1548080
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExW
OpenThreadToken
RegCreateKeyExA
RegQueryValueExA
FreeSid
RegQueryInfoKeyW
GetLengthSid
RegDeleteValueW
SetSecurityDescriptorDacl
RegDeleteKeyW
AllocateAndInitializeSid
AllocateAndInitializeSid
RegDeleteKeyW
AdjustTokenPrivileges
RegSetValueExA
RegCloseKey
RegSetValueExW
GetLengthSid
GetTokenInformation
OpenThreadToken
RegDeleteValueW
RegEnumValueW
RegEnumValueW
InitializeAcl
AllocateAndInitializeSid
RegDeleteValueW
RegOpenKeyExA
AdjustTokenPrivileges
AddAccessAllowedAce
InitializeSecurityDescriptor
AddAccessAllowedAce
RegEnumValueW
RegQueryValueExW
CloseServiceHandle
RegEnumKeyExW
RegQueryValueExW
CloseServiceHandle
RegOpenKeyW
RegSetValueExW
GetLengthSid
RegQueryInfoKeyW
RegCreateKeyExW
RegOpenKeyExW
RegCreateKeyExA
RegCreateKeyExA
RegQueryInfoKeyW
RegCreateKeyExW
RegOpenKeyExA
CloseServiceHandle
RegDeleteKeyW
GetTokenInformation
RegDeleteKeyW
RegQueryValueExA
RegCloseKey
RegQueryValueExA
RegCreateKeyExW
RegOpenKeyW
RegDeleteValueW
RegOpenKeyExW
AdjustTokenPrivileges
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExA
InitializeAcl
InitializeAcl
OpenProcessToken
RegOpenKeyExA
RegQueryValueExW
RegSetValueExA
RegCreateKeyExA
RegEnumKeyExW
OpenThreadToken
OpenThreadToken
CloseServiceHandle
user32
GetSystemMenu
WinHelpW
EnableWindow
SetWindowLongW
GetKeyState
DefWindowProcW
DispatchMessageW
WinHelpW
DestroyIcon
DestroyMenu
wsprintfA
FillRect
SetWindowTextW
GetDesktopWindow
MapWindowPoints
EndPaint
LoadStringA
CopyRect
GetWindow
IsWindowVisible
DestroyWindow
SetWindowTextW
LoadAcceleratorsW
GetCursorPos
PostMessageW
OffsetRect
CallWindowProcW
wsprintfW
MapWindowPoints
DestroyIcon
LoadStringW
CallWindowProcW
MessageBeep
SetWindowPos
GetCursorPos
IsDlgButtonChecked
LoadIconW
DispatchMessageA
kernel32
InterlockedDecrement
VirtualFree
InterlockedDecrement
GetModuleHandleA
lstrcpyW
GetVersionExA
GetModuleHandleA
GetStartupInfoW
WaitForSingleObject
LoadLibraryA
Sections
Size: 148KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�vmp0 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE