Static task
static1
Behavioral task
behavioral1
Sample
41418de6df2a2594a4b313e9f03af2b9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
41418de6df2a2594a4b313e9f03af2b9_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
41418de6df2a2594a4b313e9f03af2b9_JaffaCakes118
-
Size
61KB
-
MD5
41418de6df2a2594a4b313e9f03af2b9
-
SHA1
57ed60cfb00b7c0da895e88332a198cb637f1d06
-
SHA256
1804d04424bede780dbe10f9c2dfee1bdc2ccd8fc9ec5c2df73418a051580014
-
SHA512
ccfb4f7326a73dc39817f0ab6a2f624558f126d19d85867dffe7f3cb88e780f6ba34f965cdf4ed3476989bf7d4ca317d81bf55bb0c716e3c789227f81ff1b495
-
SSDEEP
1536:mI1QIWmXnmn392vCe9QhMugQBKGjEl/7XpvC4kbjTvsBpdBB:mI1QA20C1MuOGgl/t64kbjIR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 41418de6df2a2594a4b313e9f03af2b9_JaffaCakes118
Files
-
41418de6df2a2594a4b313e9f03af2b9_JaffaCakes118.exe windows:4 windows x86 arch:x86
b1754790e259a23be5f2dd4ad6e41138
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
ChangeServiceConfigA
DeleteService
InitializeSecurityDescriptor
OpenSCManagerA
QueryServiceConfig2A
RegCloseKey
RegDeleteValueA
RegQueryInfoKeyA
RegQueryValueA
SetSecurityDescriptorDacl
UnlockServiceDatabase
kernel32
CompareStringA
CopyFileA
CreateEventA
CreateFileA
CreateFileMappingA
CreateThread
CreateToolhelp32Snapshot
DeleteAtom
DeleteCriticalSection
DuplicateHandle
EnterCriticalSection
ExitProcess
FileTimeToLocalFileTime
FindClose
FindNextFileA
FlushFileBuffers
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetConsoleOutputCP
GetCurrentProcess
GetCurrentThread
GetEnvironmentVariableA
GetFileAttributesA
GetFileSize
GetFileTime
GetLastError
GetLocalTime
GetModuleHandleA
GetPrivateProfileSectionA
GetProcessHeap
GetShortPathNameA
GetStdHandle
GetStringTypeA
GetSystemDirectoryA
GetSystemInfo
GetSystemTime
GetTempPathA
GetTimeFormatA
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExA
HeapAlloc
HeapDestroy
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsDebuggerPresent
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalFree
MapViewOfFile
Module32First
MoveFileA
OpenEventA
OpenProcess
QueryPerformanceCounter
ReadFile
RemoveDirectoryA
SetCurrentDirectoryA
SetLastError
SetPriorityClass
SetThreadPriority
SizeofResource
SuspendThread
SystemTimeToFileTime
TlsAlloc
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualQuery
WaitForSingleObject
WriteFile
lstrcmpA
lstrlenA
user32
CharNextA
CreateWindowExA
DefWindowProcA
DispatchMessageA
GetAsyncKeyState
GetKeyState
GetMenuItemCount
InvalidateRect
IsChild
IsDlgButtonChecked
LoadBitmapA
LoadStringA
MessageBeep
MessageBoxA
OffsetRect
PostMessageA
PostQuitMessage
RegisterClipboardFormatA
RegisterWindowMessageA
SendDlgItemMessageA
SetDlgItemInt
SetDlgItemTextA
SetWindowPos
SetWindowTextA
SystemParametersInfoA
UnhookWindowsHookEx
UnregisterClassA
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 15KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ