Static task
static1
Behavioral task
behavioral1
Sample
747f243756ee899e58e364417be1ab72_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
747f243756ee899e58e364417be1ab72_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
747f243756ee899e58e364417be1ab72_JaffaCakes118
-
Size
1.5MB
-
MD5
747f243756ee899e58e364417be1ab72
-
SHA1
2a557454fe70626165257832b99e4d99e5a46bb1
-
SHA256
e53f3d3ad4f40b11f4ee2a1cedf612589470c672bf0a1a1cf1f95182efc4b08a
-
SHA512
043aa9119014fdc8b2c742664765b7bd6e85d08042a90a57f8914bcb45ab339a9a3583c9a57532f5c18e230f3de5f24adf839b33ae44287d4c3f0aa117c6a7f9
-
SSDEEP
24576:7NXpop9ARM6UWEcyQhikMur02hjCODXOkVdu606ls/B5ouqpgNiL1QqTG9lTWgk5:RXUAStcypkbldu6WpKW7qa9wgi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 747f243756ee899e58e364417be1ab72_JaffaCakes118
Files
-
747f243756ee899e58e364417be1ab72_JaffaCakes118.exe windows:5 windows x86 arch:x86
a3bd22266eb24d1360da6caba55e87b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileExA ��
kernel32
CreateProcessA
SetThreadPriority
GetCurrentThread
SetPriorityClass
ResumeThread
GetEnvironmentVariableA
GetShortPathNameA
GetStartupInfoA
GetTempPathA
FindResourceA
LoadResource
GetModuleHandleA
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
GetModuleFileNameA
SetFilePointer
ReadFile
CloseHandle
DeleteFileA
MoveFileExA
Sleep
GetSystemDirectoryA
SetFileAttributesA
GetTickCount
lstrcatA
GetCurrentProcess
user32
wsprintfA
advapi32
CloseServiceHandle
ControlService
DeleteService
StartServiceA
OpenSCManagerA
CreateServiceA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
OpenServiceA
msvcrt
__setusermatherr
_except_handler3
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
_itoa
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
iphlpapi
GetAdaptersInfo
psapi
GetMappedFileNameW
Sections
tye Size: 1.5MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jotzej Size: 16B - Virtual size: 396KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ouze Size: 16B - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
jpu Size: 80B - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zekpuz Size: 16B - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fkpua Size: 32B - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fkpvafk Size: 32B - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE