Static task
static1
Behavioral task
behavioral1
Sample
475b911b73bd1c2e05f6b121babf35d2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
475b911b73bd1c2e05f6b121babf35d2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
475b911b73bd1c2e05f6b121babf35d2_JaffaCakes118
-
Size
84KB
-
MD5
475b911b73bd1c2e05f6b121babf35d2
-
SHA1
d2df222c5031f52a5974afe1c84ee19b28a40bad
-
SHA256
65dbdcea02cffd3efdc107835d6ebb92d73b3273219c5ee1bd0a076edd2b63b0
-
SHA512
93f1111f63731b82faf6df6252bb4b42a2355ee84880352673380748f03bf985543be30efe8bb3109678743555bd79b63ed0c5cbedd50f45c8ca979e3d43e013
-
SSDEEP
1536:oxaXBFIZDV+PYGA1ifvMPt6a5FplUgCzfHwdBoSqQFybOl60a:oxaXLIZDDM8Ph/jUgldB3qQsbOl60a
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 475b911b73bd1c2e05f6b121babf35d2_JaffaCakes118
Files
-
475b911b73bd1c2e05f6b121babf35d2_JaffaCakes118.exe windows:4 windows x86 arch:x86
4402573556465c2b4680edcbb52f7389
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
GetSystemInfo
CopyFileA
GetShortPathNameA
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
VirtualProtect
LoadLibraryA
FreeLibrary
GetWindowsDirectoryA
CreateProcessA
CreateMutexA
SetConsoleCtrlHandler
GetModuleHandleA
GetProcAddress
Sleep
GetModuleFileNameA
AllocConsole
GetStdHandle
GlobalAlloc
GlobalFree
FormatMessageA
LocalFree
GetLastError
GetVersionExA
CreateEventA
WaitForSingleObject
CloseHandle
SetEvent
OpenProcess
GetLocaleInfoA
RtlUnwind
RaiseException
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
GetFileType
GetCommandLineA
ExitProcess
CreateDirectoryA
GetFileAttributesA
HeapAlloc
HeapFree
DeleteCriticalSection
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetUnhandledExceptionFilter
HeapReAlloc
TerminateProcess
GetCurrentProcess
HeapSize
GetACP
GetOEMCP
GetCPInfo
SetHandleCount
GetStartupInfoA
InitializeCriticalSection
WriteFile
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
IsBadWritePtr
InterlockedExchange
VirtualQuery
IsBadReadPtr
IsBadCodePtr
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
SetFilePointer
user32
RegisterClassA
DestroyWindow
DefWindowProcA
CreateWindowExA
advapi32
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
StartServiceA
RegDeleteValueA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegDeleteKeyA
RegCreateKeyA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
SetServiceStatus
GetUserNameA
LookupAccountNameA
IsValidSid
GetLengthSid
CopySid
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 216B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ