Static task
static1
Behavioral task
behavioral1
Sample
46710f6c0af6812fff942ff1b20c80c1_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
46710f6c0af6812fff942ff1b20c80c1_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
46710f6c0af6812fff942ff1b20c80c1_JaffaCakes118
-
Size
179KB
-
MD5
46710f6c0af6812fff942ff1b20c80c1
-
SHA1
8d3506ff432b635933a98f7547725a9105727224
-
SHA256
8bdf056871c793f759c623a2db1b027beee4baf6fc6daf2e3115d4b06720aca3
-
SHA512
7b0d1e9d4e84bae8b9ace36e1fe74fdc8dd11ae9a34d021b5bb13466f06ee01631eadb8f1aea65d9e82fa20a9207fe3bc3be423d6150766f8261787a27885ff1
-
SSDEEP
3072:PGTapN9HcrwgSMkdwukATOwVnjaHXA45jp8gVCEMmxzt0OFebnUDVCSl29gBWUkP:PGTG95JMkdeAT1eHD5jp8hSzt0ge7UuM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 46710f6c0af6812fff942ff1b20c80c1_JaffaCakes118
Files
-
46710f6c0af6812fff942ff1b20c80c1_JaffaCakes118.exe windows:4 windows x86 arch:x86
020cfb01bd4e724f3a9e265cdb8ad5ec
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CloseServiceHandle
EqualSid
FreeSid
GetUserNameA
LookupAccountSidA
QueryServiceConfig2A
RegEnumKeyExA
RegQueryValueA
RegisterServiceCtrlHandlerA
StartServiceA
kernel32
AddAtomA
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
DeleteAtom
DeleteCriticalSection
DisableThreadLibraryCalls
DuplicateHandle
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
FindResourceA
FormatMessageA
FreeLibrary
GetCommandLineA
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStringsA
GetEnvironmentVariableA
GetExitCodeProcess
GetFileTime
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileSectionA
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameA
GetThreadLocale
GetTickCount
GetTimeZoneInformation
GetVersionExA
GetWindowsDirectoryA
GlobalHandle
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
InitializeCriticalSection
InterlockedExchange
IsBadCodePtr
IsBadReadPtr
IsDebuggerPresent
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
LockResource
MoveFileExA
OutputDebugStringA
QueryPerformanceCounter
ReadFile
ReadProcessMemory
ReleaseMutex
RemoveDirectoryA
ResumeThread
SetEndOfFile
SetFileAttributesA
SetFileTime
SetLastError
SetThreadPriority
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatA
lstrcpyA
lstrcpynA
lstrlenA
ole32
CoSetProxyBlanket
CoTaskMemAlloc
OleRegGetMiscStatus
user32
BeginPaint
CallWindowProcA
CharPrevA
CheckDlgButton
DefWindowProcA
DestroyMenu
DrawTextA
FillRect
GetClientRect
GetCursorPos
GetDlgItemTextA
GetForegroundWindow
GetMessagePos
GetSysColorBrush
GetWindow
IsChild
IsWindow
IsWindowEnabled
MessageBoxA
PostQuitMessage
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseCapture
SetFocus
SetForegroundWindow
SetMenu
SetWindowTextA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
CODE Size: 95KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CRT Size: 76KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ