Static task
static1
Behavioral task
behavioral1
Sample
79097eebf19084123d14f07e2f4d1209_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
79097eebf19084123d14f07e2f4d1209_JaffaCakes118
-
Size
192KB
-
MD5
79097eebf19084123d14f07e2f4d1209
-
SHA1
2a705a470218f24a18f600ff71af283ef9ecb652
-
SHA256
7d84fa8227840c92bb6bdc747a2e7b1078bd1e3a43eb72e14c1fcd8abe2565ce
-
SHA512
8b5509a43db8d44230fa60b2f3d23956f2d46af48cc47b15f6fef07c56f242aacf4b8f41bbd602d71ea4724afb1f0c4710f9a96bfb2fb18397f617286fa27d16
-
SSDEEP
3072:GOhfV2TwMRd1CaH0Ewm0ZDsBiPXhoHp0YzqtNR2D1B1lKKXGu8wp19Z:GcfVAwfLGiPXhoJt2tNRo1BW239Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 79097eebf19084123d14f07e2f4d1209_JaffaCakes118
Files
-
79097eebf19084123d14f07e2f4d1209_JaffaCakes118.exe windows:4 windows x86 arch:x86
cf40fab5a2f65e08d364b7e6834e4a15
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetDriveTypeW
GetDriveTypeA
GetFileSize
WaitForSingleObject
DeleteFileW
DeviceIoControl
IsBadWritePtr
ResetEvent
CreateEventA
QueryDosDeviceA
SetEndOfFile
CreateDirectoryA
GetTempFileNameA
CreateDirectoryW
GetTempFileNameW
CreateFileA
CreateFileW
WriteFile
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
lstrcatA
lstrcpyA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleHandleA
GetStartupInfoA
GetShortPathNameA
MultiByteToWideChar
lstrlenA
InterlockedIncrement
lstrlenW
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
GetCommandLineA
lstrcmpiA
GetCurrentThreadId
GetCurrentThread
InterlockedDecrement
CloseHandle
CreateMutexA
ReadFile
SetFilePointer
WideCharToMultiByte
GetLastError
user32
CharNextA
GetMessageA
wsprintfA
DispatchMessageA
PostThreadMessageA
MessageBoxA
LoadStringA
msvcrt
__set_app_type
_controlfp
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
_stati64
_wstati64
wcslen
_splitpath
_makepath
_wmakepath
_wsplitpath
swprintf
wcschr
wcscpy
wcscat
malloc
free
vsprintf
puts
fopen
vfprintf
fclose
__CxxFrameHandler
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
strncpy
strncmp
strtok
toupper
_wcslwr
_wcsicmp
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExA
RegEnumKeyExW
RegEnumKeyExA
RegQueryValueExW
RegSetValueExW
RegSetValueExA
RegCreateKeyExW
RegCreateKeyExA
RegDeleteKeyW
RegDeleteKeyA
RegDeleteValueA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenThreadToken
CreateServiceA
DeleteService
ControlService
StartServiceCtrlDispatcherA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CopySid
GetLengthSid
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
GetTokenInformation
OpenProcessToken
RegOpenKeyExA
shell32
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
ole32
CoInitializeSecurity
CoDisconnectObject
CoRegisterClassObject
CoRevokeClassObject
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
LoadRegTypeLi
SysFreeString
SysAllocString
LoadTypeLi
RegisterTypeLi
SysStringLen
shlwapi
PathFileExistsA
PathFileExistsW
winmm
timeGetTime
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE