Static task
static1
Behavioral task
behavioral1
Sample
829dbe1550fdbaad637d8ebdcdb1fb31_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
829dbe1550fdbaad637d8ebdcdb1fb31_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
829dbe1550fdbaad637d8ebdcdb1fb31_JaffaCakes118
-
Size
62KB
-
MD5
829dbe1550fdbaad637d8ebdcdb1fb31
-
SHA1
26d15679a2202ece1c9c1f462ec26a40dbe38d48
-
SHA256
3aa0375e1515e2f1c50e9101e3cc93af8e65d48a8a85296a94bdc4c7c2400d17
-
SHA512
d41155673c3ed0f1ba22b89c2823ccee4686b9634f366425eabca963a6de82d944fe128c0327bbb15d03a7d7f047d20a948fdeebedd8cf5c2892efca59357573
-
SSDEEP
768:vqIogxprsQ/F8rQDbxlumUrK88+ILnsNh3CZ6DD8eoiOGWxZmUm/XZGkJpfZrOWN:Loe5sQ8E3vZxsNh3CZ6/7TYk1GlLA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 829dbe1550fdbaad637d8ebdcdb1fb31_JaffaCakes118
Files
-
829dbe1550fdbaad637d8ebdcdb1fb31_JaffaCakes118.exe windows:4 windows x86 arch:x86
4d72c37f65758d0615fb7fd7df520450
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AllocateAndInitializeSid
ChangeServiceConfigA
CloseServiceHandle
DeleteService
OpenSCManagerA
QueryServiceStatus
RegOpenKeyA
UnlockServiceDatabase
kernel32
CloseHandle
CreateFileA
CreateThread
CreateToolhelp32Snapshot
DeviceIoControl
DisableThreadLibraryCalls
EnterCriticalSection
EnumSystemLocalesA
ExitProcess
ExitThread
FindNextFileA
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetEnvironmentStringsA
GetFileTime
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileSectionNamesA
GetProcAddress
GetProcessHeap
GetStdHandle
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameA
GetThreadTimes
GetTickCount
GetTimeZoneInformation
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalHandle
HeapCreate
HeapDestroy
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
Module32Next
MulDiv
MultiByteToWideChar
OpenEventA
OpenProcess
OutputDebugStringA
QueryPerformanceCounter
ReadFile
RtlUnwind
SearchPathA
SetCurrentDirectoryA
SetFileAttributesA
SetFilePointer
SetHandleCount
SetStdHandle
SetThreadPriority
SuspendThread
TlsAlloc
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcpyA
lstrlenA
user32
ClientToScreen
CreatePopupMenu
DefWindowProcA
DestroyMenu
DestroyWindow
DialogBoxParamA
EndPaint
FindWindowA
GetDC
GetDlgCtrlID
GetDlgItem
GetDlgItemTextA
GetFocus
GetForegroundWindow
GetMenuItemCount
GetMessageA
GetWindowPlacement
IntersectRect
LoadCursorA
LoadImageA
LoadStringA
MessageBoxA
PeekMessageA
PostMessageA
RegisterClassExA
SetDlgItemInt
SetWindowLongA
SetWindowPos
UnregisterClassA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 15KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ