Static task
static1
Behavioral task
behavioral1
Sample
882bcd3eefa4c0237c14e6d8a611ac1d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
882bcd3eefa4c0237c14e6d8a611ac1d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
882bcd3eefa4c0237c14e6d8a611ac1d_JaffaCakes118
-
Size
64KB
-
MD5
882bcd3eefa4c0237c14e6d8a611ac1d
-
SHA1
889c33737a085c29fe65927c2e8080d850546a23
-
SHA256
c53eb6973c4170d27c6d86b659b65e270782413d04b943e25778b7c62100cd4c
-
SHA512
07156cb66a123f8826b03de397da2cca7aa8423f11ed568ec97159db6e824a0c1ba9b846a042637ce40ab51a2463ecceffed4814d6f26dea4299268f2fca3dd2
-
SSDEEP
768:b64o/bgYKflWlmx1G+BoS8biwvqudOE5E1uAq7oZBjiwDIcZ:e4ojeNWKE/dbT6jRD/Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 882bcd3eefa4c0237c14e6d8a611ac1d_JaffaCakes118
Files
-
882bcd3eefa4c0237c14e6d8a611ac1d_JaffaCakes118.exe windows:4 windows x86 arch:x86
2c9726be88e0cc57369d800c8462696c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFileTime
CreateDirectoryW
GetComputerNameW
GlobalMemoryStatus
GetVersionExW
ExitProcess
VirtualProtect
GetModuleHandleW
UnmapViewOfFile
GetFileTime
VirtualQuery
GetCurrentProcessId
CreateFileMappingW
GetTickCount
CreateMutexW
ReleaseMutex
OpenMutexW
GetCommandLineW
GetDriveTypeW
GetDiskFreeSpaceExW
GetVolumeInformationW
RemoveDirectoryW
DeleteFileW
LocalLock
LocalUnlock
GetEnvironmentVariableW
PeekNamedPipe
CreateThread
Sleep
GetFullPathNameW
LoadLibraryW
GetProcAddress
FreeLibrary
GetTempPathW
GetTempFileNameW
CreatePipe
CreateProcessW
HeapFree
WaitForSingleObject
ReadFile
MultiByteToWideChar
GetLastError
TerminateProcess
WideCharToMultiByte
VirtualFree
VirtualAlloc
GetModuleFileNameW
GetSystemDirectoryW
MoveFileW
CopyFileW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenProcess
LocalAlloc
LocalFree
GetCurrentProcess
CloseHandle
FindFirstFileW
FindNextFileW
FindClose
GetWindowsDirectoryW
CreateFileW
GetFileSize
SetFilePointer
GetLocalTime
WriteFile
GetProcessHeap
HeapAlloc
MapViewOfFile
user32
GetDesktopWindow
wsprintfW
GetClientRect
GetActiveWindow
DrawTextExW
GetIconInfo
ExitWindowsEx
MessageBoxW
gdi32
SelectObject
SetTextColor
SetBkColor
SetBkMode
DeleteObject
DeleteDC
CreateDCW
GetDIBits
GetObjectW
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
CreateFontW
GetBitmapBits
advapi32
CloseServiceHandle
ChangeServiceConfig2W
RegCreateKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
GetUserNameW
LsaNtStatusToWinError
LookupAccountSidW
DuplicateTokenEx
ImpersonateLoggedOnUser
CreateProcessAsUserW
GetSecurityInfo
GetNamedSecurityInfoW
BuildExplicitAccessWithNameW
SetEntriesInAclW
SetNamedSecurityInfoW
AllocateAndInitializeSid
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessDeniedAce
SetSecurityInfo
FreeSid
LookupPrivilegeValueW
OpenProcessToken
AdjustTokenPrivileges
StartServiceCtrlDispatcherW
StartServiceW
RegisterServiceCtrlHandlerW
SetServiceStatus
OpenServiceW
DeleteService
OpenSCManagerW
CreateServiceW
shell32
SHGetFileInfoW
ntdll
wcscmp
_wcsnicmp
wcsncmp
wcslen
wcsstr
memmove
ZwTerminateThread
NtVdmControl
RtlInitUnicodeString
ZwOpenSection
ZwClose
ZwQuerySystemInformation
_chkstk
wcscpy
wcschr
wcsrchr
wcscat
sprintf
vsprintf
_wcsicmp
ws2_32
closesocket
WSAStartup
htonl
bind
WSAGetLastError
listen
ntohs
accept
ioctlsocket
select
__WSAFDIsSet
socket
htons
inet_addr
gethostbyname
connect
recv
send
inet_ntoa
getpeername
mpr
WNetEnumResourceW
WNetOpenEnumW
WNetCloseEnum
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ