Static task
static1
Behavioral task
behavioral1
Sample
753d595164a884b990e4ad5493216564_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
753d595164a884b990e4ad5493216564_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
753d595164a884b990e4ad5493216564_JaffaCakes118
-
Size
82KB
-
MD5
753d595164a884b990e4ad5493216564
-
SHA1
0d8932ac0e84ff789b7336392b8e09953540733b
-
SHA256
bb2f6649cff78537775a9b16ddfc5533e363149d5e7f15db7b22a4739e6b530a
-
SHA512
75dbb322213023fe1dcf2c43080569f9cce6c2677ae2d2f756326574dd243f6368df7f7a71308163ecb282a4bd78a97d69d225b2bd7f716c8652017637f713a7
-
SSDEEP
1536:6ifIC0+mHBvBiGc0Qy6CdlQ5/huUGIwK/+M4qzQL34+28a8ZiIlcI:juNvBiGc0QyjGfGIJ/+M4dIIXnlcI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 753d595164a884b990e4ad5493216564_JaffaCakes118
Files
-
753d595164a884b990e4ad5493216564_JaffaCakes118.exe windows:4 windows x86 arch:x86
35a728018eda12c46bec02ab0a3f07a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
GetUserNameA
InitializeSecurityDescriptor
RegCloseKey
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetKeySecurity
RegSetValueExA
SetSecurityDescriptorDacl
kernel32
CreateDirectoryA
CreateMutexA
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FreeLibrary
GetCommandLineA
GetComputerNameA
GetEnvironmentVariableA
GetLastError
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetStartupInfoA
GetSystemDirectoryA
GetVersionExA
GetWindowsDirectoryA
InitializeCriticalSection
InterlockedExchange
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
MultiByteToWideChar
SetUnhandledExceptionFilter
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WideCharToMultiByte
msvcrt
_close
__getmainargs
__lc_codepage
__mb_cur_max
__p___argv
__p__environ
__p__fmode
__set_app_type
_cexit
_errno
_iob
_onexit
_setmode
_winmajor
abort
atexit
calloc
fclose
fflush
fopen
fputc
fread
free
fseek
ftell
fwrite
getc
getenv
localeconv
localtime
malloc
memcpy
memset
printf
putc
puts
remove
signal
sprintf
strcat
strcpy
strftime
strlen
strncmp
strrchr
time
vfprintf
wcslen
shell32
ShellExecuteA
user32
CallNextHookEx
DispatchMessageA
GetAsyncKeyState
GetKeyState
GetKeyboardLayoutNameA
GetMessageA
SetWindowsHookExA
TranslateMessage
UnhookWindowsHookEx
ws2_32
WSACleanup
WSAStartup
connect
gethostbyname
htons
recvfrom
select
sendto
socket
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 616B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 512B - Virtual size: 220B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 6KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE