Static task
static1
Behavioral task
behavioral1
Sample
48fc758f97c0c2694374d9e7a27daf31_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
48fc758f97c0c2694374d9e7a27daf31_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
48fc758f97c0c2694374d9e7a27daf31_JaffaCakes118
-
Size
24KB
-
MD5
48fc758f97c0c2694374d9e7a27daf31
-
SHA1
715f647a9b8e86594068432b2b2d7330d8a38f81
-
SHA256
474870750d558fc1a5523dbf04f1916bfe33bf788778ca2b369a5d4f930f43e7
-
SHA512
7e9c0196d3631871486e5d80cf65c374c396cd63b3222030400df76caebf1b6e6901477f46d6f435070939c2d1c091417ff4c9f209f2815580b6ea3f64502b0c
-
SSDEEP
384:SHxuVCG7+fRZPAF3ypTDU6cdIRuK+jyOB8nDOQwaVAw2YtqdUA+7O:SEH+zQ3ypTDVcdvK+eM8KwVsdEO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 48fc758f97c0c2694374d9e7a27daf31_JaffaCakes118
Files
-
48fc758f97c0c2694374d9e7a27daf31_JaffaCakes118.exe windows:4 windows x86 arch:x86
8688dd222b161af0e9bfb08c7aec6806
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
WritePrivateProfileStringA
GetSystemTimeAsFileTime
LoadLibraryA
WriteConsoleW
QueryPerformanceCounter
InitializeCriticalSection
EnterCriticalSection
ExitProcess
CreateFileA
LeaveCriticalSection
TerminateProcess
VirtualAlloc
WriteProfileSectionW
WritePrivateProfileSectionA
DeleteCriticalSection
UnhandledExceptionFilter
FreeLibrary
WriteProfileStringA
GetCurrentProcessId
InterlockedDecrement
WideCharToMultiByte
GetLastError
GetCurrentProcess
LoadResource
GetCurrentThreadId
GetTickCount
SetUnhandledExceptionFilter
LockResource
GetProcAddress
Sleep
MultiByteToWideChar
LocalFree
SizeofResource
InterlockedIncrement
CloseHandle
ws2_32
socket
closesocket
WSAStartup
WSACleanup
setsockopt
listen
send
bind
accept
WSALookupServiceNextA
oleaut32
SysStringByteLen
SysAllocStringByteLen
SysAllocStringLen
GetActiveObject
SysFreeString
VariantCopyInd
VariantClear
SafeArrayCreate
VariantCopy
SysReAllocStringLen
user32
DestroyWindow
ShowWindow
GetParent
GetDC
LoadStringW
GetClientRect
GetSystemMetrics
wsprintfA
ArrangeIconicWindows
ReleaseDC
EnableWindow
AnimateWindow
MessageBoxA
TranslateMessage
GetDlgItem
GetWindowRect
BeginPaint
EndDialog
advapi32
RegQueryValueExW
RegDeleteKeyA
GetTokenInformation
RegDeleteKeyW
ObjectCloseAuditAlarmA
RegEnumKeyExW
AddAccessAllowedAce
InitializeSecurityDescriptor
RegCreateKeyExW
RegEnumValueW
RegCloseKey
RegQueryInfoKeyW
RegOpenKeyExW
FreeSid
OpenThreadToken
AccessCheckByTypeResultListAndAuditAlarmByHandleW
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
AccessCheckByTypeAndAuditAlarmA
RegOpenKeyExA
RegSetValueExA
GetLengthSid
OpenProcessToken
AllocateAndInitializeSid
RegEnumKeyExA
CloseServiceHandle
RegSetValueExW
RegDeleteValueW
msvcrt
__doserrno
_chdir
_cabs
_access
_close
_c_exit
_cgetws
_beep
_atoldbl
__set_app_type
_atoi64
_chgsign
_assert
_cgets
__threadid
ole32
CoCreateObjectInContext
CoCreateInstance
CLSIDFromProgIDEx
CLSIDFromProgID
BindMoniker
CoCreateInstanceEx
CLIPFORMAT_UserSize
CLIPFORMAT_UserMarshal
PropVariantChangeType
CLIPFORMAT_UserFree
CLSIDFromOle1Class
CLIPFORMAT_UserUnmarshal
ws2help
WahCloseThread
WahCloseHandleHelper
WahCompleteRequest
WahCloseSocketHandle
WahCloseNotificationHandleHelper
comdlg32
PageSetupDlgA
GetSaveFileNameA
WantArrows
PrintDlgA
GetOpenFileNameA
LoadAlterBitmap
CommDlgExtendedError
dwLBSubclass
dwOKSubclass
ChooseColorA
GetFileTitleA
PrintDlgExA
ChooseFontA
FindTextA
ReplaceTextA
Sections
BSS Size: - Virtual size: 12KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 393B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ