Static task
static1
Behavioral task
behavioral1
Sample
73173f93fbf2f47fd7a435d680026adf_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
73173f93fbf2f47fd7a435d680026adf_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73173f93fbf2f47fd7a435d680026adf_JaffaCakes118
-
Size
76KB
-
MD5
73173f93fbf2f47fd7a435d680026adf
-
SHA1
a30fab0b51443612bd50abd4dde158adeb87629b
-
SHA256
276bceacda96ba596756794c9217f946b9f63f76ad94d276e05e5d96dcc882c8
-
SHA512
25d664e939fa1af632d93995d16956626700b58e2590988f25b46896e8aff4051274d9829ca89838b3ae08ddbcbbe2ae5423cc9c42aca64d40aa6909fd4bc9e9
-
SSDEEP
768:bgSPRc+7BssVULtw57EOKIp+/Nt4ACwGPAjQd4nQgJmTkS+ylqYPJskmgtHmScA:hPRQ5Le/INt4uGCQ4WKREJHmgtHaA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 73173f93fbf2f47fd7a435d680026adf_JaffaCakes118
Files
-
73173f93fbf2f47fd7a435d680026adf_JaffaCakes118.exe windows:4 windows x86 arch:x86
ab57d86fdb86052cb7ad987aa095b1e6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetShortPathNameA
lstrcmpA
CreateProcessA
GetVersionExA
GetProcAddress
GetModuleHandleA
ExpandEnvironmentStringsA
GetFileAttributesExA
GetCurrentProcessId
FileTimeToLocalFileTime
SetFilePointer
CreateDirectoryA
GetLocalTime
FreeLibrary
LoadLibraryA
SetEnvironmentVariableA
CompareStringW
CompareStringA
OutputDebugStringA
lstrcatA
DeleteFileA
CreateFileA
WriteFile
MoveFileA
ResetEvent
CloseHandle
GetTickCount
Sleep
GetLastError
SetEvent
lstrcpyA
GetModuleFileNameA
CreateEventA
CreateThread
WaitForSingleObject
TerminateThread
lstrcmpiA
FileTimeToSystemTime
lstrlenA
FlushFileBuffers
SetStdHandle
SetConsoleCtrlHandler
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
ExitProcess
TerminateProcess
GetCurrentProcess
RtlUnwind
GetTimeZoneInformation
GetSystemTime
HeapFree
HeapAlloc
GetStartupInfoA
GetCommandLineA
GetVersion
HeapReAlloc
HeapSize
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
user32
wvsprintfA
wsprintfA
advapi32
RegEnumKeyA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyA
RegSetValueExA
RegCloseKey
SetServiceStatus
RegisterServiceCtrlHandlerA
EnumServicesStatusA
CreateServiceA
StartServiceA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
OpenSCManagerA
ChangeServiceConfig2A
CloseServiceHandle
StartServiceCtrlDispatcherA
RegOpenKeyExA
shell32
SHGetFileInfoA
ShellExecuteA
wininet
HttpQueryInfoA
InternetSetOptionA
InternetOpenA
InternetReadFile
InternetCloseHandle
InternetOpenUrlA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
shlwapi
SHDeleteKeyA
SHDeleteValueA
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ