Static task
static1
Behavioral task
behavioral1
Sample
4a4987abf54ddabf9702673e155a243f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4a4987abf54ddabf9702673e155a243f_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4a4987abf54ddabf9702673e155a243f_JaffaCakes118
-
Size
32KB
-
MD5
4a4987abf54ddabf9702673e155a243f
-
SHA1
b4bcb60f8aac882887645ab8557f1a8519acd381
-
SHA256
d508f079e82b7061464ccca6ade4a43429ed8f10736753d6c7ba48b3723d2618
-
SHA512
9834fe37eb95d7c7c01803c231622ac5aee88a5ef92b061e4d9d0c64240c9460c4e7496e9bac8e6643b9bd20c0265caa74cea2b7c3c1a508a59714c0fcaba2a1
-
SSDEEP
384:I16xyOqOGN7m5Kkl6F6CcLjD/MPJszgbJ:JxyOHGN7IYIjD/MOz0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4a4987abf54ddabf9702673e155a243f_JaffaCakes118
Files
-
4a4987abf54ddabf9702673e155a243f_JaffaCakes118.exe windows:4 windows x86 arch:x86
c88ebdf8c04d29284b6e640fab591d5f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GlobalFree
LoadLibraryExA
GlobalAlloc
GetCurrentProcess
DuplicateHandle
ReadFile
GetFileSize
SetFileAttributesA
lstrcatA
GetWindowsDirectoryA
GetModuleFileNameA
GetDriveTypeA
GetCurrentProcessId
MoveFileExA
CreateMutexA
GetFileAttributesA
SetLocalTime
GetLocalTime
Sleep
VirtualAllocEx
WriteProcessMemory
WinExec
DeviceIoControl
GetLastError
CreateFileA
WriteFile
GetSystemDirectoryA
CopyFileA
FreeLibrary
ExitProcess
LoadLibraryA
GetSystemDirectoryW
lstrcatW
GetModuleHandleA
GetProcAddress
OpenProcess
TerminateProcess
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
CloseHandle
user32
MessageBoxA
GetWindowTextA
WindowFromPoint
FindWindowA
GetWindowThreadProcessId
PostMessageA
GetParent
GetCursorPos
advapi32
RegCloseKey
StartServiceA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenSCManagerA
OpenServiceA
CloseServiceHandle
ControlService
RegOpenKeyExA
RegDeleteKeyA
RegOpenKeyA
RegSetValueExA
RegCreateKeyExA
RegCreateKeyA
shell32
ShellExecuteA
msvcrt
strstr
free
__dllonexit
_onexit
sprintf
fprintf
??2@YAPAXI@Z
strncpy
fopen
fclose
Sections
Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nah Size: 181B - Virtual size: 512B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE