Static task
static1
Behavioral task
behavioral1
Sample
822aa2ce0c6f383336d80a15425dc87c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
822aa2ce0c6f383336d80a15425dc87c_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
822aa2ce0c6f383336d80a15425dc87c_JaffaCakes118
-
Size
52KB
-
MD5
822aa2ce0c6f383336d80a15425dc87c
-
SHA1
e69a275d98a03ba6ae56c7164c73960187cf7963
-
SHA256
cadae6a39270dd3264d07bb739200dfc19b4b2ab6dc0212dfc87fdb9b554d09f
-
SHA512
85768abf57eb05d6bb9daa834d4c87f42f4f8b8a87196f7cbd8460183a514c0dbd385954b0c46cbd0542223fa1ac5478b3c8fabe65c9eadcba3ec9e26a357b3f
-
SSDEEP
768:8Y7AIgCulBSTMdFR01czjJyJV4Pc9yV8yY5RYYntkP4+Cny9QPSIhygtj:8QEAkFHj++kLyYgYtkgV17ntj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 822aa2ce0c6f383336d80a15425dc87c_JaffaCakes118
Files
-
822aa2ce0c6f383336d80a15425dc87c_JaffaCakes118.exe windows:4 windows x86 arch:x86
d4db46dd89904f2721e9c9f5551c31b1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ControlService
EqualSid
InitializeSecurityDescriptor
LockServiceDatabase
RegQueryInfoKeyA
RegSetValueExA
RegisterServiceCtrlHandlerA
kernel32
CopyFileA
CreateEventA
CreateFileA
CreateFileMappingA
CreateThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DeleteFileA
DeviceIoControl
DuplicateHandle
ExitProcess
ExitThread
FindClose
FindFirstFileA
FindNextFileA
FormatMessageA
FreeLibrary
GetConsoleMode
GetCurrentProcess
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStringsA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetPrivateProfileSectionA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetStdHandle
GetSystemInfo
GetSystemTime
GetTempPathA
GetThreadLocale
GetThreadTimes
GetTickCount
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
HeapDestroy
HeapReAlloc
InitializeCriticalSection
InterlockedCompareExchange
InterlockedExchange
InterlockedIncrement
IsBadCodePtr
IsBadReadPtr
IsDebuggerPresent
IsValidLocale
LoadLibraryExA
LoadResource
LocalAlloc
Module32Next
MultiByteToWideChar
QueryPerformanceCounter
ReleaseMutex
RemoveDirectoryA
SetEnvironmentVariableA
SetErrorMode
SetEvent
SetPriorityClass
SetStdHandle
SetUnhandledExceptionFilter
Sleep
SuspendThread
UnhandledExceptionFilter
VirtualAlloc
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
user32
CharNextA
CharUpperA
CreatePopupMenu
DialogBoxParamA
DispatchMessageA
FindWindowA
GetActiveWindow
GetDC
GetDlgItem
GetFocus
GetForegroundWindow
GetMessagePos
GetSubMenu
GetSysColorBrush
GetWindowDC
GetWindowThreadProcessId
InflateRect
IntersectRect
IsIconic
LoadBitmapA
MessageBoxA
OffsetRect
SendDlgItemMessageA
SendMessageA
SetDlgItemInt
SetRect
SetTimer
SetWindowLongA
SetWindowRgn
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.INIT Size: 12KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ