Static task
static1
Behavioral task
behavioral1
Sample
48e55e7ab054c085977a833d60b317c0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
48e55e7ab054c085977a833d60b317c0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
48e55e7ab054c085977a833d60b317c0_JaffaCakes118
-
Size
56KB
-
MD5
48e55e7ab054c085977a833d60b317c0
-
SHA1
90d2dabcc7f21dc1debd83909e22c46bc5256e08
-
SHA256
e4e0ba5ee3d2546e5a655a18874422dd9a9918da9ad1541a58f8192b8efcb9eb
-
SHA512
bc6962c6b9fd01441f4eed157f25ef9b03a9b99df390a8f264f490104f4b48f2cb611e9073aa70f4cda3539dbb55c7900964edb26ad1aa81a51dfc87e8f0407f
-
SSDEEP
1536:PB7GwqmxDNaM4jZKiIK+XVkHIg7u1SsbR:5qmLz4U/FkogKp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48e55e7ab054c085977a833d60b317c0_JaffaCakes118
Files
-
48e55e7ab054c085977a833d60b317c0_JaffaCakes118.exe windows:4 windows x86 arch:x86
54a9fe283bd923bdd921c4c8b0206eca
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ChangeServiceConfigA
CloseServiceHandle
DeleteService
LockServiceDatabase
OpenServiceA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
kernel32
CreateEventA
CreateFileA
CreateProcessA
CreateThread
DeleteAtom
DeleteFileA
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FindClose
FreeLibrary
GetACP
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetEnvironmentVariableA
GetFileTime
GetFileType
GetLastError
GetModuleHandleA
GetPrivateProfileSectionA
GetPrivateProfileSectionNamesA
GetProcessHeap
GetStdHandle
GetSystemDirectoryA
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetThreadLocale
GetTickCount
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalReAlloc
HeapCreate
HeapFree
HeapSize
InitializeCriticalSection
InterlockedDecrement
IsBadCodePtr
IsBadWritePtr
LoadLibraryA
LocalFree
MapViewOfFile
OpenProcess
QueryPerformanceCounter
ReadFile
ReadProcessMemory
RemoveDirectoryA
RtlUnwind
SetCurrentDirectoryA
SetFilePointer
SetFileTime
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsFree
UnmapViewOfFile
VirtualFree
VirtualQuery
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcmpA
user32
CallNextHookEx
CharUpperA
ClientToScreen
CreateDialogParamA
CreateWindowExA
DestroyWindow
DialogBoxParamA
DrawFocusRect
DrawIcon
EndDialog
EndPaint
GetCapture
GetKeyState
GetWindowDC
GetWindowThreadProcessId
IsIconic
IsWindow
MessageBoxA
PostMessageA
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
SendMessageA
SetWindowLongA
SetWindowTextA
SystemParametersInfoA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 13KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ