Static task
static1
Behavioral task
behavioral1
Sample
8806db2d7b4b235b7bcb7784d73af2b5_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
8806db2d7b4b235b7bcb7784d73af2b5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8806db2d7b4b235b7bcb7784d73af2b5_JaffaCakes118
-
Size
192KB
-
MD5
8806db2d7b4b235b7bcb7784d73af2b5
-
SHA1
e2df6ddc31eb9dce126d234892e8ef0a707bb1fb
-
SHA256
2e43bcb8c27a12dccb3922814b64dd93171966132adb9aaa1a80ebbbbe8e758f
-
SHA512
3b8123f4ec2860175130ec479dc6594bf140d4337854535a5cc4c188562e6b584c4b2d2047134d6ee5beb60a5b0de77a14ed357be8736e124e865a7d43945750
-
SSDEEP
3072:26yJjhkd6WyV1Oh/eqecTgcT4DLljZM0/7n23+3tdlmBKsQ1xwd3:B6WyVYUcTgMIJjZD/r23+LlmxQrS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8806db2d7b4b235b7bcb7784d73af2b5_JaffaCakes118
Files
-
8806db2d7b4b235b7bcb7784d73af2b5_JaffaCakes118.exe windows:4 windows x86 arch:x86
dbcc4ec8e419b94f071c3dac4e3e46a5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
SetFileSecurityA
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
EqualSid
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
LookupAccountNameA
GetFileSecurityA
RegCloseKey
RegOpenKeyExA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegDeleteValueA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
ChangeServiceConfig2A
CloseServiceHandle
DeleteService
CreateServiceA
OpenSCManagerA
ControlService
StartServiceA
GetServiceKeyNameA
GetUserNameA
msvcrt
strncpy
memset
_except_handler3
_controlfp
__set_app_type
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
tolower
toupper
malloc
free
strstr
__p__fmode
_CxxThrowException
__CxxFrameHandler
strcmp
??3@YAXPAX@Z
memcpy
??2@YAPAXI@Z
_ftol
srand
rand
strlen
strcpy
_strnicmp
_strrev
_strlwr
_stricmp
_strupr
_itoa
strchr
strncat
strcat
user32
CharNextA
wsprintfA
kernel32
LoadLibraryA
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
GetStartupInfoA
CreateToolhelp32Snapshot
Process32First
GetCurrentProcessId
Process32Next
SetFileAttributesA
DeleteFileA
MultiByteToWideChar
WideCharToMultiByte
GetCommandLineA
SetUnhandledExceptionFilter
OpenEventA
ExpandEnvironmentStringsA
GetShortPathNameA
GetFileAttributesA
CreateEventA
WaitForSingleObject
GetModuleFileNameA
lstrcmpiA
GetSystemDirectoryA
GetTickCount
FindFirstFileA
FindNextFileA
CreateFileA
WriteFile
SystemTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
CloseHandle
MoveFileA
GetCurrentDirectoryA
GetTempPathA
GetWindowsDirectoryA
lstrcpyA
HeapFree
Sleep
GetProcAddress
GetModuleHandleA
HeapAlloc
GetProcessHeap
GetLastError
lstrcatA
ExitProcess
CreateDirectoryA
SetEnvironmentVariableA
lstrlenA
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ