Static task
static1
Behavioral task
behavioral1
Sample
5b4f5f2772b269806a12dbecbebb4a22_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
5b4f5f2772b269806a12dbecbebb4a22_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5b4f5f2772b269806a12dbecbebb4a22_JaffaCakes118
-
Size
972KB
-
MD5
5b4f5f2772b269806a12dbecbebb4a22
-
SHA1
28cbd72bc1883a5f0624dea486599633c67fc867
-
SHA256
6e4d98107fee30c5a04e6ec454c9be33f46e0302b22e8a8378e12636fb5bce38
-
SHA512
6cebb9d79eff3f114567adfdd560af215939223533602118b7c4c94f5b0154672c92636eb9d9be3a58ec04e8fe0ce89486f8282598f39d55deffa4ba493fa1e2
-
SSDEEP
6144:ODV44TBhvuQJUi9iab/ga1/ri22xcPxGFyzAJWXd6XbwO0m29KK0a75d5oPwFg1j:QV44TXvuwYCd+TxcPxGFiNFnR9l7+Pd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5b4f5f2772b269806a12dbecbebb4a22_JaffaCakes118
Files
-
5b4f5f2772b269806a12dbecbebb4a22_JaffaCakes118.exe windows:4 windows x86 arch:x86
6838510cff62313dd69b4fe3e8665d29
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2763
ord6662
ord533
ord5194
ord3811
ord3337
ord6407
ord1997
ord798
ord1601
ord356
ord2770
ord1980
ord6385
ord668
ord825
ord941
ord5856
ord4129
ord540
ord5683
ord4277
ord4278
ord858
ord6874
ord860
ord2818
ord535
ord2915
ord354
ord5186
ord665
ord5773
ord5442
ord1979
ord537
ord4202
ord2764
ord800
ord823
msvcrt
_onexit
__dllonexit
_ftol
ceil
memmove
free
malloc
_stricmp
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
strcmp
time
srand
rand
_vsnprintf
_except_handler3
_mbsicmp
wcslen
_wcsicmp
_splitpath
sprintf
getenv
strcat
memset
memcpy
__CxxFrameHandler
strstr
strcpy
strlen
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
kernel32
CreateProcessA
CreateDirectoryA
FindFirstFileA
FindClose
GetModuleFileNameA
CreateFileA
GetFileSize
Sleep
GetStartupInfoA
LoadResource
LockResource
SizeofResource
ExitProcess
Module32First
CreateToolhelp32Snapshot
Process32First
Process32Next
GetCurrentProcessId
CloseHandle
DeleteFileA
SetFileAttributesA
MoveFileA
CopyFileA
GetTempFileNameA
GetSystemWindowsDirectoryA
ExpandEnvironmentStringsA
WriteFile
MoveFileExA
MultiByteToWideChar
GetCurrentProcess
UnmapViewOfFile
ReadProcessMemory
MapViewOfFile
CreateFileMappingA
WriteProcessMemory
VirtualProtectEx
VirtualQueryEx
OpenProcess
FindResourceA
GetSystemDirectoryA
GetVersionExA
VirtualAlloc
VirtualFree
CreatePipe
GetStdHandle
GetTempPathA
GetTickCount
lstrcatA
LoadLibraryA
FreeLibrary
VirtualAllocEx
GetModuleHandleA
GetProcAddress
CreateRemoteThread
GetWindowsDirectoryA
lstrlenA
OutputDebugStringA
GetSystemInfo
GetLastError
user32
MessageBoxA
advapi32
AdjustTokenPrivileges
OpenProcessToken
DeregisterEventSource
ReportEventA
RegisterEventSourceA
CloseServiceHandle
StartServiceA
RegCloseKey
RegSetValueExA
RegOpenKeyA
CreateServiceA
OpenSCManagerA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
LookupPrivilegeValueA
shell32
ShellExecuteA
shlwapi
SHSetValueA
winmm
timeGetTime
msvcp60
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADHD@Z
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
??0Init@ios_base@std@@QAE@XZ
Sections
.text Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 372KB - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
HG Size: 64B - Virtual size: 64B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
HG Size: 64B - Virtual size: 64B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
HG Size: 64B - Virtual size: 64B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
HG Size: 64B - Virtual size: 64B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
HG Size: 64B - Virtual size: 64B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
HG Size: 64B - Virtual size: 64B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
HG Size: 64B - Virtual size: 64B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
HG Size: 64B - Virtual size: 64B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE