Static task
static1
Behavioral task
behavioral1
Sample
3825a1db4229bca276eaf10055cd1cd3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
3825a1db4229bca276eaf10055cd1cd3_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3825a1db4229bca276eaf10055cd1cd3_JaffaCakes118
-
Size
170KB
-
MD5
3825a1db4229bca276eaf10055cd1cd3
-
SHA1
09d39d05a0b454972d7f33a3ce81b82ab4feebb4
-
SHA256
e5d57edaf38a98f4678fd944cc8f3329c781101117e726765420c9279283471e
-
SHA512
aeb30ac4937c40662df681b695f9b1ff62bbfe713b18c5a6afa62544e8a5fc6c315e144f3428c0092a90c6882fb774b1d5f48e7bdad0324441b212cba79a1cfd
-
SSDEEP
3072:fhKZ9s/v+p+0cQET+gfFffgpCE4pmfCjZbitwMGuyANm0Klzk:ZKbs/mpFcQETl7RDQGuhG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3825a1db4229bca276eaf10055cd1cd3_JaffaCakes118
Files
-
3825a1db4229bca276eaf10055cd1cd3_JaffaCakes118.exe windows:4 windows x86 arch:x86
f03f829a23801a5435d472af842bb5a6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
AllocateAndInitializeSid
CreateServiceA
GetSecurityDescriptorControl
GetTokenInformation
LookupAccountSidA
OpenProcessToken
OpenServiceA
QueryServiceStatus
RegSetValueExA
SetServiceStatus
StartServiceCtrlDispatcherA
kernel32
CloseHandle
CreateDirectoryA
CreateEventA
CreateMutexA
DeleteCriticalSection
DeleteFileA
DeviceIoControl
DisableThreadLibraryCalls
DuplicateHandle
ExitProcess
FileTimeToLocalFileTime
FindClose
FindNextFileA
FlushFileBuffers
FormatMessageA
FreeEnvironmentStringsA
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetDateFormatA
GetEnvironmentStringsA
GetFileType
GetLastError
GetLocalTime
GetModuleHandleA
GetPrivateProfileStringA
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetThreadTimes
GetTickCount
GetVersion
GetVersionExA
GlobalAlloc
GlobalLock
HeapAlloc
HeapCreate
HeapDestroy
HeapReAlloc
InitializeCriticalSection
InterlockedCompareExchange
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsBadWritePtr
IsValidCodePage
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryExA
LocalAlloc
MoveFileA
MoveFileExA
OpenProcess
QueryPerformanceCounter
ReadFile
RemoveDirectoryA
ResetEvent
ResumeThread
SetEndOfFile
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
TerminateProcess
TlsFree
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualQuery
WaitForSingleObject
WriteConsoleA
lstrcatA
lstrcmpA
lstrcpyA
lstrcpynA
lstrlenA
ole32
CoFreeUnusedLibraries
CoInitializeEx
IIDFromString
user32
CharLowerA
CharNextA
CharPrevA
CharUpperA
CheckRadioButton
ClientToScreen
CreateDialogParamA
CreateWindowExA
DialogBoxParamA
ExitWindowsEx
GetClassNameA
GetClientRect
GetDC
GetMenuItemCount
GetProcessWindowStation
GetWindowLongA
GetWindowThreadProcessId
IsIconic
IsRectEmpty
LoadBitmapA
LoadStringA
MessageBeep
MessageBoxA
OffsetRect
PeekMessageA
PtInRect
RegisterClassA
SetWindowRgn
ShowWindow
TranslateMessage
UnhookWindowsHookEx
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 129KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ