Static task
static1
Behavioral task
behavioral1
Sample
389d15396455becdf0c87c059cb25873_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
389d15396455becdf0c87c059cb25873_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
389d15396455becdf0c87c059cb25873_JaffaCakes118
-
Size
509KB
-
MD5
389d15396455becdf0c87c059cb25873
-
SHA1
f33b2e3d5d78f4fcc4e46df9242fdd45c28b2256
-
SHA256
a959be49d90cfa46d5d3e6b1a19e317712ca426b28845bd7625873082007032f
-
SHA512
b4e36fa2eb33163705744b61ac73fadb854032130a178728833792c7b8c6b8e6aa1f9562ba79036629fdfad7934d83fe87b351f9a5e26fbbdfd441731d9fabcd
-
SSDEEP
12288:tlgJZz3zfDqdqKRlN+uOFFkUxzpo23FOAZOQHCfxG8/BcEiN/3IWV+cCgv:tlgJZz3zf+0hxzpl3V+/C
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 389d15396455becdf0c87c059cb25873_JaffaCakes118
Files
-
389d15396455becdf0c87c059cb25873_JaffaCakes118.exe windows:4 windows x86 arch:x86
9f6b0127ea358a4de8348dfb993a5ffd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
kernel32
AddAtomA
AllocConsole
CloseHandle
CopyFileA
CreateSemaphoreA
ExitProcess
FindAtomA
GetAtomNameA
GetCommandLineA
GetCurrentProcess
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetStartupInfoA
InterlockedDecrement
InterlockedIncrement
OpenProcess
ReleaseSemaphore
SetConsoleTitleA
SetLastError
SetUnhandledExceptionFilter
Sleep
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WriteProcessMemory
msvcrt
_fdopen
_getcwd
_mkdir
_read
_strdup
_write
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_ctype
_errno
_filelengthi64
_fstati64
_iob
_isctype
_lseeki64
_onexit
_pctype
_setmode
_strnicmp
_vsnprintf
abort
atexit
ctime
fclose
fflush
fgetpos
fopen
fprintf
fread
free
fsetpos
fwrite
getc
localeconv
malloc
memchr
memcpy
memmove
memset
putc
setlocale
setvbuf
signal
strcmp
strcoll
strcpy
strftime
strlen
strtod
strxfrm
time
ungetc
user32
CallNextHookEx
CreateWindowExA
DefWindowProcA
DispatchMessageA
FindWindowA
GetForegroundWindow
GetMessageA
GetWindowTextA
GetWindowTextLengthA
GetWindowThreadProcessId
LoadCursorA
LoadIconA
MessageBoxA
PostQuitMessage
RegisterClassExA
SetWindowsHookExA
ShowWindow
TranslateMessage
UnhookWindowsHookEx
wininet
FtpPutFileA
InternetConnectA
InternetOpenA
Sections
.text Size: 255KB - Virtual size: 255KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 416B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 19KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE