Static task
static1
Behavioral task
behavioral1
Sample
6a675438eb8f9c997a06f55ae8a3d69a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6a675438eb8f9c997a06f55ae8a3d69a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6a675438eb8f9c997a06f55ae8a3d69a_JaffaCakes118
-
Size
228KB
-
MD5
6a675438eb8f9c997a06f55ae8a3d69a
-
SHA1
5ac9d142a57712c9a3070614b02a59d11050737a
-
SHA256
92e6b39c6e0fd7f9aaabfd95347de132b7890615aea0ae1bcdbdad72b00b4fa1
-
SHA512
263243ff0b93fc7bb5665148d02d32a558604b6cfa3ce952e8ad95b115c28383173acab952f7c946ff3ae3ec53b82aca6ea508a1fa3b096a4b12c4d0c7469744
-
SSDEEP
3072:Y8YjTG0xuCCs0H8N+ntnS37/hlW+GkiCUINvrRS5QvqOgdPfV:5YjTGCuFENmtnS37/hk+Gki+guCtPd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6a675438eb8f9c997a06f55ae8a3d69a_JaffaCakes118
Files
-
6a675438eb8f9c997a06f55ae8a3d69a_JaffaCakes118.exe windows:4 windows x86 arch:x86
c6f43d08e869ec51bc4ba1213c647595
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibrary
TerminateProcess
WaitForSingleObject
CreateProcessA
GetVersionExA
WideCharToMultiByte
GetLastError
SetFileTime
GetFileAttributesExA
GetModuleFileNameA
GetStartupInfoA
GetModuleHandleA
Sleep
WinExec
GetProcAddress
WriteFile
OpenProcess
GetCurrentProcess
DuplicateHandle
CloseHandle
GetSystemDirectoryA
CreateFileA
LoadLibraryA
user32
GetMessageA
SendMessageTimeoutA
RegisterWindowMessageA
TranslateMessage
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
DefWindowProcA
PostQuitMessage
ShowWindow
CreateWindowExA
GetDesktopWindow
DispatchMessageA
GetClassNameA
RegisterClassExA
advapi32
GetUserNameA
OpenSCManagerA
CreateServiceA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
DeleteService
OpenServiceA
ConvertSidToStringSidA
LookupAccountNameA
StartServiceA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
msvcrt
strstr
_strlwr
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
time
srand
_access
__CxxFrameHandler
_stricmp
fclose
fflush
fwrite
fopen
rand
sprintf
??3@YAXPAX@Z
??2@YAPAXI@Z
wcslen
atoi
strchr
shlwapi
SHSetValueA
SHGetValueA
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ