Static task
static1
Behavioral task
behavioral1
Sample
788fcd7981a88f679ddb6ba89fa585a4_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
788fcd7981a88f679ddb6ba89fa585a4_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
788fcd7981a88f679ddb6ba89fa585a4_JaffaCakes118
-
Size
209KB
-
MD5
788fcd7981a88f679ddb6ba89fa585a4
-
SHA1
373a7d73e4b1c18e07d2c6dc4a5777300c808b0d
-
SHA256
d2f6f06de96f99af15471b45bcbcd748e628d8dba0b97893f497ea6f8e20e4a1
-
SHA512
57f49f84163e43349229088eb93ef578e6cbf63a756f0f9a322c9c59bb2ece23a7ff65e65db18d00ae247ea4d5b4dfdebbf912c9275568db21bce28887f5883c
-
SSDEEP
6144:mrUCGygU2qb/0e6D80iOPEP3uzREF3Rr4pa9Q:mrUxU3b/0e6D80bVREZRr4M9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 788fcd7981a88f679ddb6ba89fa585a4_JaffaCakes118
Files
-
788fcd7981a88f679ddb6ba89fa585a4_JaffaCakes118.exe windows:4 windows x86 arch:x86
6f7b1bb42c2cc301e8a311921192122b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
ChangeServiceConfig2A
CloseServiceHandle
ControlService
DeleteService
GetSecurityInfo
GetUserNameA
LockServiceDatabase
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
OpenServiceA
QueryServiceLockStatusA
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
SetEntriesInAclA
SetSecurityInfo
UnlockServiceDatabase
kernel32
CloseHandle
CopyFileA
CreateDirectoryA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateProcessA
CreateSemaphoreA
CreateThread
DeleteFileA
ExitProcess
ExitThread
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeLibrary
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentVariableA
GetFileAttributesA
GetFileInformationByHandle
GetFileSize
GetLastError
GetLocalTime
GetLogicalDriveStringsA
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemDirectoryA
GetTempPathA
GetTickCount
GetTimeZoneInformation
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
HeapAlloc
HeapFree
InterlockedDecrement
InterlockedIncrement
IsBadReadPtr
LoadLibraryA
LoadResource
LocalAlloc
LocalFileTimeToFileTime
LocalFree
LockResource
MapViewOfFile
OpenProcess
ReadFile
ReleaseSemaphore
SetFileAttributesA
SetFilePointer
SetFileTime
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnmapViewOfFile
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
msvcrt
_strcmpi
__getmainargs
__p__environ
__p__fmode
__set_app_type
_cexit
_iob
_onexit
_setmode
_snprintf
_strdup
_strupr
abort
atexit
atoi
calloc
difftime
fclose
fgets
fopen
fprintf
fputc
fputs
free
fwrite
gmtime
isalnum
isspace
isxdigit
localtime
malloc
memcpy
memset
mktime
printf
puts
rand
realloc
signal
sprintf
srand
sscanf
strcat
strcmp
strcpy
strftime
strlen
strncpy
strrchr
strstr
time
tolower
toupper
shell32
ShellExecuteA
user32
CharLowerA
GetDesktopWindow
wsprintfA
wvsprintfA
ws2_32
WSAStartup
closesocket
connect
gethostbyaddr
gethostbyname
htons
inet_addr
ntohs
recv
select
send
sendto
socket
Sections
.text Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 14KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE