Static task
static1
Behavioral task
behavioral1
Sample
4aa88740957115d405bbf95b6f748789_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
4aa88740957115d405bbf95b6f748789_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4aa88740957115d405bbf95b6f748789_JaffaCakes118
-
Size
177KB
-
MD5
4aa88740957115d405bbf95b6f748789
-
SHA1
d2f83fdd6ad81376ca0c15aec0b11810f351adfd
-
SHA256
093a3e4bbc8e02edb51639a15b6bdd316c8c8b5e222ca13556e9a8e7502d8335
-
SHA512
adf934d6ce621ce77c7466dc03f31cee7cc777785e7bda325de869beeb0c84331ca12c702076c0cde0248a49f9516b848b9b0bc6aee6b06da35b32f4b1da0c99
-
SSDEEP
3072:Lx6AQ3q78hJNVEhlUJ0Kmc9nFzrp342Nvz0AHHXmrTokgKaU:LD7/hlfMtvYAnXm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4aa88740957115d405bbf95b6f748789_JaffaCakes118
Files
-
4aa88740957115d405bbf95b6f748789_JaffaCakes118.exe windows:4 windows x86 arch:x86
7827c8ed40ea14b35dfdefbdbd55964a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ControlService
DeleteService
GetUserNameA
LookupAccountSidA
LookupPrivilegeValueA
OpenServiceA
RegOpenKeyA
SetServiceStatus
StartServiceCtrlDispatcherA
kernel32
ContinueDebugEvent
CopyFileA
CreateDirectoryA
CreateFileA
CreateThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DuplicateHandle
EnumSystemLocalesA
ExitProcess
FindFirstFileA
FindResourceA
FlushFileBuffers
FreeLibrary
GetCPInfo
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThread
GetDateFormatA
GetDriveTypeA
GetEnvironmentVariableA
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStructA
GetProcAddress
GetShortPathNameA
GetStdHandle
GetStringTypeA
GetSystemDirectoryA
GetThreadLocale
GetTickCount
GetUserDefaultLCID
GetWindowsDirectoryA
GlobalHandle
GlobalLock
GlobalUnlock
HeapDestroy
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsBadCodePtr
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
Module32First
MoveFileExA
QueryPerformanceCounter
ReadFile
ReadProcessMemory
RemoveDirectoryA
ResetEvent
RtlUnwind
SetCurrentDirectoryA
SetEnvironmentVariableA
SetErrorMode
SetFileAttributesA
SetFilePointer
SetHandleCount
SetUnhandledExceptionFilter
SizeofResource
Sleep
UnhandledExceptionFilter
VirtualAlloc
VirtualQuery
WaitForSingleObject
WriteConsoleA
WriteFile
lstrcmpiA
user32
CallWindowProcA
CharUpperA
DestroyIcon
DestroyWindow
DrawTextA
EqualRect
FillRect
GetDC
GetDlgCtrlID
GetKeyState
GetMessagePos
GetParent
GetSysColor
GetWindowPlacement
GetWindowTextLengthA
IsWindow
KillTimer
MessageBoxA
OffsetRect
PeekMessageA
PostQuitMessage
RegisterWindowMessageA
ReleaseCapture
SendDlgItemMessageA
SendMessageA
SetDlgItemInt
SetRect
SetWindowLongA
SystemParametersInfoA
UnregisterClassA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 116KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
apwca Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
mgtac Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ