Static task
static1
Behavioral task
behavioral1
Sample
712d3704ff97250965edcd21c3dd2918_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
712d3704ff97250965edcd21c3dd2918_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
712d3704ff97250965edcd21c3dd2918_JaffaCakes118
-
Size
254KB
-
MD5
712d3704ff97250965edcd21c3dd2918
-
SHA1
a8c48d1930c69a6b32e1a720b69a3be4066cb29f
-
SHA256
fda0c0e855f85b13ab51780ac5bf801c0bcbcac8f4ee1f90f5492e31a86b9a0b
-
SHA512
6fa1f16882cad9aca815d7128209112f8d79d6003d19606d18717ffe08c7dd226748b1bf66556283f0c6f3542c1c2e48b1a5a43546ec61cc2484cefbd588295c
-
SSDEEP
6144:alHRK6RZ/LuFzEDTMZZfIZXNjNsRJNaNWx0IKaZhWZKln10j:alHg63/LuAMQjsNaIxNTZhCA10j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 712d3704ff97250965edcd21c3dd2918_JaffaCakes118
Files
-
712d3704ff97250965edcd21c3dd2918_JaffaCakes118.exe windows:4 windows x86 arch:x86
50f763d828d1e1a7b372651b0f5de0b9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
netapi32
NetApiBufferFree
NetUserEnum
kernel32
lstrcmpW
CompareFileTime
lstrlenA
lstrlenW
lstrcpynW
FreeLibrary
CreateDirectoryW
LocalAlloc
RemoveDirectoryW
GetWindowsDirectoryW
LocalFree
IsDebuggerPresent
GetCurrentThreadId
WaitForSingleObject
CreateEventW
ExpandEnvironmentStringsA
OpenEventW
GetModuleHandleW
GetTempPathW
SetUnhandledExceptionFilter
GetVersion
GetProcAddress
user32
GetForegroundWindow
GetSystemMetrics
CopyRect
RegisterWindowMessageW
GetCursorPos
InvalidateRect
GetFocus
LoadCursorW
DestroyIcon
GetSysColor
MoveWindow
IsWindow
GetTopWindow
SetTimer
OffsetRect
PostMessageW
SetWindowPos
SendMessageW
EnableWindow
gdi32
CreateFontIndirectW
CreateRectRgn
CreateCompatibleDC
DeleteObject
CreatePatternBrush
CreateSolidBrush
advapi32
IsValidSecurityDescriptor
FreeSid
RegOpenKeyExA
RegQueryValueExA
OpenServiceW
StartServiceW
QueryServiceStatus
OpenSCManagerW
CloseServiceHandle
RegCreateKeyExW
RegDeleteValueW
RegSetValueExW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RevertToSelf
AddAccessAllowedAce
SetSecurityDescriptorOwner
AllocateAndInitializeSid
InitializeAcl
ImpersonateSelf
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AccessCheck
SetSecurityDescriptorGroup
OpenThreadToken
OpenProcessToken
GetLengthSid
shell32
ShellExecuteW
usp10
UspFreeMem
ScriptApplyDigitSubstitution
ScriptCPtoX
ScriptJustify
icmp
IcmpCloseHandle
IcmpParseReplies
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.IjU Size: 2KB - Virtual size: 207KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kXA Size: 2KB - Virtual size: 395KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ze Size: 2KB - Virtual size: 543KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.UsAk Size: 2KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CW Size: 93KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.XLbC Size: 2KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.w Size: 122KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ