Static task
static1
Behavioral task
behavioral1
Sample
5e83a78a32b5715c938ab710a405bd77_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5e83a78a32b5715c938ab710a405bd77_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5e83a78a32b5715c938ab710a405bd77_JaffaCakes118
-
Size
168KB
-
MD5
5e83a78a32b5715c938ab710a405bd77
-
SHA1
aec663f096e3f7b67351636f2f836a0527cdc302
-
SHA256
97823a31943bf0496f8a834e090e1ca94edbd2e0ebaff34c28c1837273ecae3d
-
SHA512
85373a87eed629214ff70b739cd60047df5b0d2489916416bb44fe768e9f11065481c808e2d203752b921dd3ed585553dee512324565a1a213565903f002630b
-
SSDEEP
1536:xZFdpT1dt9Fl7n7WEIrLiSRg61ailH5TMiBiADUVdSiFTEW+dRe+bMww0Ku2:xp97WEsL7g6plJB3ALr6e+IgKX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5e83a78a32b5715c938ab710a405bd77_JaffaCakes118
Files
-
5e83a78a32b5715c938ab710a405bd77_JaffaCakes118.exe windows:4 windows x86 arch:x86
02f06b4a2a3acf41d0f15b795b53b5ec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
TerminateProcess
WaitForSingleObject
CreateProcessA
DuplicateHandle
GetCurrentProcess
OpenProcess
FreeLibrary
CreateFileA
GetStartupInfoA
GetModuleHandleA
WideCharToMultiByte
CloseHandle
GetLastError
GetModuleFileNameA
WinExec
GetSystemDirectoryA
GetFileAttributesExA
SetFileTime
Sleep
GetVersionExA
WriteFile
user32
DefWindowProcA
RegisterClassExA
PostQuitMessage
SendMessageTimeoutA
RegisterWindowMessageA
GetClassNameA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
DispatchMessageA
GetDesktopWindow
TranslateMessage
GetMessageA
ShowWindow
CreateWindowExA
advapi32
CreateServiceA
StartServiceA
OpenServiceA
DeleteService
ConvertSidToStringSidA
LookupAccountNameA
GetUserNameA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
OpenSCManagerA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
shlwapi
SHGetValueA
SHSetValueA
msvcrt
fopen
_stricmp
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??2@YAPAXI@Z
??3@YAXPAX@Z
_access
__CxxFrameHandler
strstr
strchr
atoi
wcslen
_strlwr
rand
sprintf
srand
time
fclose
fflush
fwrite
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ