Static task
static1
Behavioral task
behavioral1
Sample
416e81f6fc499445592a24707702cd10_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
416e81f6fc499445592a24707702cd10_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
416e81f6fc499445592a24707702cd10_JaffaCakes118
-
Size
290KB
-
MD5
416e81f6fc499445592a24707702cd10
-
SHA1
d5a8afc881164a5799d9c1b2d9cccc055d951917
-
SHA256
524b7ac0c13de9dd96b584a542db2d9a27e8e29995c04f28641a99617818b41a
-
SHA512
37126f1d9b3110ec21769406515691ef953d2cf31e30eac6832c898c125a4098ce226a80fa4d1350e78eb471c60de5db175a0b04db643a923db808f9addea356
-
SSDEEP
6144:orQ08QELwCePsttPDeLd8RhsMkBQ+hOsZPJl9UjCv/MZ9bWLDat:pwELw0ttPDeLdfHBvzPJl92q/MZ9Kat
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 416e81f6fc499445592a24707702cd10_JaffaCakes118
Files
-
416e81f6fc499445592a24707702cd10_JaffaCakes118.exe windows:4 windows x86 arch:x86
bb5a5fb4167bfb84f15eda1160151624
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
ChangeServiceConfigA
GetTokenInformation
LockServiceDatabase
LookupPrivilegeValueA
OpenSCManagerA
RegEnumKeyExA
RegisterServiceCtrlHandlerA
SetSecurityDescriptorDacl
kernel32
CloseHandle
CompareStringA
ContinueDebugEvent
CreateDirectoryA
CreateEventA
CreateFileA
CreateMutexA
CreateThread
DeleteCriticalSection
DeleteFileA
DisableThreadLibraryCalls
DuplicateHandle
ExitProcess
ExitThread
FindNextFileA
FindResourceA
FormatMessageA
FreeEnvironmentStringsA
GetConsoleCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentVariableA
GetFileAttributesA
GetFileTime
GetFullPathNameA
GetLastError
GetLocalTime
GetPrivateProfileSectionA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
GetPrivateProfileStructA
GetProcAddress
GetStartupInfoA
GetStringTypeA
GetSystemTimeAsFileTime
GetThreadLocale
GetThreadTimes
GetVersion
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapCreate
HeapDestroy
HeapReAlloc
InitializeCriticalSection
InterlockedCompareExchange
InterlockedExchange
IsBadReadPtr
IsValidLocale
LCMapStringA
LoadLibraryA
LoadResource
LocalAlloc
MapViewOfFile
Module32First
MultiByteToWideChar
RaiseException
RemoveDirectoryA
ResumeThread
SetErrorMode
SetEvent
SetFileAttributesA
SetFileTime
SetLastError
SetPriorityClass
SetStdHandle
Sleep
SystemTimeToFileTime
TlsAlloc
TlsGetValue
VirtualAlloc
WaitForSingleObject
WritePrivateProfileStringA
lstrlenA
user32
CallWindowProcA
CharPrevA
CharUpperA
DestroyMenu
DestroyWindow
DrawFocusRect
EnableWindow
GetAsyncKeyState
GetDlgCtrlID
GetSysColorBrush
GetWindow
GetWindowLongA
GetWindowTextA
IsWindowEnabled
LoadImageA
MessageBeep
MessageBoxA
PeekMessageA
PostMessageA
PtInRect
RegisterClassExA
RegisterWindowMessageA
SetRect
SetTimer
SetWindowPos
ShowWindow
TrackPopupMenu
TranslateMessage
UnregisterClassA
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 232KB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
ebfhl Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
djmeh Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ