Static task
static1
Behavioral task
behavioral1
Sample
47ff8f1af989b853df5debbadbb85252_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
47ff8f1af989b853df5debbadbb85252_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
47ff8f1af989b853df5debbadbb85252_JaffaCakes118
-
Size
645KB
-
MD5
47ff8f1af989b853df5debbadbb85252
-
SHA1
0ada1d037283def1788abacdea9b2a710651a6d5
-
SHA256
973ee9dd7da7b31b47659375b8760f206689c01bcdfff956ce85488dee4def03
-
SHA512
37adf700680f15ecc88531b30ba54edba78ff556e1203a5eceaad522b2c1876dffcd342089308c30cc2a673b8d19e44ee79fd7294be4d5c65a9aa3ff90b92581
-
SSDEEP
12288:GqjWFAssQFitkTJ6q/GWCtuTtvdTfGJBxQPhCTjQtsvb0vRigJ3uZie:GqjWFJrF2kE2CwTpdTOFyhMQmv4RhSn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 47ff8f1af989b853df5debbadbb85252_JaffaCakes118
Files
-
47ff8f1af989b853df5debbadbb85252_JaffaCakes118.exe windows:4 windows x86 arch:x86
4fa6c0a14b2f90f83e884c93e5f204e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileAttributesA
GetFullPathNameA
GetModuleHandleA
FreeLibraryAndExitThread
GetStringTypeExW
WriteConsoleOutputW
GetLocaleInfoW
PeekNamedPipe
GetLogicalDriveStringsA
SearchPathW
CreateMutexW
SetErrorMode
CreateEventA
RaiseException
GetHandleInformation
ScrollConsoleScreenBufferA
lstrcpynA
GetEnvironmentVariableW
GetLongPathNameA
SwitchToFiber
FormatMessageA
VirtualQuery
GetThreadContext
GetDiskFreeSpaceW
GetBinaryTypeA
MultiByteToWideChar
GetPrivateProfileStringA
EnumResourceLanguagesW
FlushFileBuffers
SetNamedPipeHandleState
GetCurrentDirectoryW
GenerateConsoleCtrlEvent
GetThreadPriority
GetBinaryTypeW
GetDateFormatA
_lopen
SetCommMask
ReadFile
FindResourceExA
LocalLock
EraseTape
WriteFile
LoadLibraryExA
EnumDateFormatsW
lstrcmpA
_llseek
ConnectNamedPipe
VirtualProtect
GetSystemTimeAsFileTime
GlobalUnlock
SetConsoleMode
GetOEMCP
FindCloseChangeNotification
FindFirstFileA
FreeResource
CreateDirectoryExA
OpenFile
PeekConsoleInputW
FillConsoleOutputCharacterA
GetProcessHeap
CreatePipe
GetSystemTimeAdjustment
SetProcessWorkingSetSize
IsBadWritePtr
AreFileApisANSI
GetDiskFreeSpaceExA
LocalAlloc
LCMapStringA
ExitThread
FindFirstFileExW
GlobalFree
GlobalFindAtomW
FindFirstFileW
WriteProcessMemory
QueryDosDeviceA
GetCurrentProcess
Beep
ExitProcess
user32
GetDC
CharNextExA
SetWindowLongA
CopyImage
LoadAcceleratorsW
DefDlgProcW
GetUpdateRect
SetTimer
IsCharAlphaA
SendMessageTimeoutW
GetCapture
SetProcessWindowStation
SetWindowTextW
SetScrollPos
SystemParametersInfoW
UnregisterDeviceNotification
gdi32
SetLayout
EnumFontsA
CreateEnhMetaFileA
SetEnhMetaFileBits
LineDDA
SelectClipPath
SetBitmapDimensionEx
CreatePenIndirect
CreateHalftonePalette
SetTextAlign
GetBkColor
GetTextFaceW
comdlg32
PrintDlgA
ReplaceTextA
FindTextA
advapi32
RegSetValueW
MakeSelfRelativeSD
CloseEventLog
ChangeServiceConfigW
SetKernelObjectSecurity
ImpersonateNamedPipeClient
OpenServiceW
RegOpenKeyA
RegConnectRegistryW
GetServiceDisplayNameA
SetSecurityDescriptorSacl
LookupAccountNameW
CryptGetKeyParam
QueryServiceStatus
CreateServiceA
CryptEncrypt
SetTokenInformation
RegisterEventSourceA
DestroyPrivateObjectSecurity
shell32
FindExecutableW
DragQueryPoint
ole32
CreateOleAdviseHolder
CoGetTreatAsClass
oleaut32
VariantCopy
SysFreeString
VariantChangeType
SysAllocStringLen
SafeArrayCreate
SafeArrayGetLBound
QueryPathOfRegTypeLi
SafeArrayGetElement
comctl32
ImageList_Draw
shlwapi
StrToIntExW
PathIsDirectoryW
StrRChrW
SHRegQueryUSValueW
Sections
.text Size: 21KB - Virtual size: 237KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 316KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ