Static task
static1
Behavioral task
behavioral1
Sample
833b22b4c3a0cf400a99e4d0d3a1c0d7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
833b22b4c3a0cf400a99e4d0d3a1c0d7_JaffaCakes118.exe
Resource
win10v2004-20240730-en
General
-
Target
833b22b4c3a0cf400a99e4d0d3a1c0d7_JaffaCakes118
-
Size
152KB
-
MD5
833b22b4c3a0cf400a99e4d0d3a1c0d7
-
SHA1
5de1a93fa5dfed3b41a5b666c51bc3299212be3c
-
SHA256
6e8bc766d1c9bbfc27571dcea77dcb51b8a2dc7d923f9e98dd2835022eb615ae
-
SHA512
980f564d653c1654d13280914fe8fa7b4313a5127b069153a0f9a1cb9b316b4e77e5871a4f61eddac002bde314ed85dbce3dbff2fc2cf260b5622c9859b0f07d
-
SSDEEP
1536:1MzmXXnn4n8fqkaNGQv6KHZit+CoJF8yK:yiHfqkaNhhgt+CoU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 833b22b4c3a0cf400a99e4d0d3a1c0d7_JaffaCakes118
Files
-
833b22b4c3a0cf400a99e4d0d3a1c0d7_JaffaCakes118.exe windows:4 windows x86 arch:x86
56cd7dbaba04d14ccf0b4580ba754971
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TerminateProcess
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetVolumeInformationA
GetDriveTypeA
GetLogicalDrives
Beep
MoveFileA
CreateProcessA
GetCurrentProcessId
GetTickCount
WaitForSingleObject
GetExitCodeProcess
ReadFile
FindClose
FindNextFileA
Process32Next
GetVersionExA
GlobalMemoryStatus
GetLogicalDriveStringsA
GetLastError
CreateRemoteThread
WriteProcessMemory
VirtualAllocEx
VirtualFreeEx
GetModuleHandleA
SetStdHandle
LoadLibraryA
GetProcAddress
IsBadWritePtr
HeapReAlloc
VirtualAlloc
HeapAlloc
GetFileSize
DeleteFileA
SetFilePointer
GetVersion
GetCurrentProcess
CreateThread
ExitProcess
GetSystemDirectoryA
CloseHandle
GetPrivateProfileStringA
GetCurrentThreadId
GetModuleFileNameA
GetWindowsDirectoryA
WinExec
Sleep
SetFileAttributesA
CopyFileA
GetLocalTime
CreateFileA
WriteFile
FindFirstFileA
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
RtlUnwind
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
GetStartupInfoA
GetCommandLineA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FlushFileBuffers
user32
PostThreadMessageA
ShowWindow
GetParent
GetWindowThreadProcessId
EnumWindows
ExitWindowsEx
advapi32
DeleteService
RegQueryValueExA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegCloseKey
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
ChangeServiceConfigA
RegisterServiceCtrlHandlerA
ControlService
OpenServiceA
SetServiceStatus
OpenSCManagerA
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
StartServiceA
StartServiceCtrlDispatcherA
ws2_32
sendto
inet_addr
socket
closesocket
WSASocketA
htons
setsockopt
connect
send
recv
accept
listen
bind
gethostname
WSACleanup
WSAStartup
gethostbyname
shlwapi
PathFileExistsA
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 104KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE