Static task
static1
Behavioral task
behavioral1
Sample
84838f461978f5f7b6c21ec472714464_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
84838f461978f5f7b6c21ec472714464_JaffaCakes118
-
Size
296KB
-
MD5
84838f461978f5f7b6c21ec472714464
-
SHA1
78bdd86d460afd1ff6e63f35510a65b1722b0c1f
-
SHA256
ff58d1349ebf5db517093714db11ba5bc5fb9e44677d82703326485ecc9f4121
-
SHA512
8d25a4520759b8483bd24aa339aac58a7835e191d6318ac32c79a33c399e00f16d5769409231043481b2c03608c2c77727938e395293acb8ec6a71dd19c0986a
-
SSDEEP
3072:owC9DhUFsJBcFzfC66dXNJ2vfbrPSBCBl5WNBU030WQTOS8DD8RAenjlGvLKFhKq:WfUNgDqn5ALmM+hHtQjSEZ5S
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84838f461978f5f7b6c21ec472714464_JaffaCakes118
Files
-
84838f461978f5f7b6c21ec472714464_JaffaCakes118.exe windows:5 windows x86 arch:x86
c4213d5511392436e79b0ad137dd7452
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
RegQueryValueExA
RegDeleteValueA
kernel32
CloseHandle
lstrlenA
ReadFile
GetFileSize
CreateFileA
FreeLibrary
GetCurrentProcess
FindClose
FindFirstFileA
lstrcpyA
GetCurrentDirectoryA
lstrcmpiA
GetModuleHandleA
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetSystemDefaultLangID
GetModuleFileNameA
GetProcAddress
SetCurrentDirectoryA
OutputDebugStringA
SetErrorMode
GetLastError
CreateMutexA
GetVersionExA
GetWindowsDirectoryA
GetProcessHeap
SetEndOfFile
RtlUnwind
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
SetFilePointer
FlushFileBuffers
SetStdHandle
HeapReAlloc
InitializeCriticalSection
GetCPInfo
GetOEMCP
GetACP
lstrcatA
LoadLibraryA
GetStartupInfoA
GetCommandLineA
GetLocalTime
ExitProcess
WriteFile
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsFree
SetLastError
GetCurrentThreadId
TlsSetValue
TlsGetValue
TlsAlloc
HeapDestroy
HeapCreate
VirtualFree
HeapFree
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
LCMapStringA
MultiByteToWideChar
LCMapStringW
gdi32
GetDeviceCaps
user32
EnableWindow
LoadStringA
SetWindowPos
DialogBoxParamA
EnumWindows
SetDlgItemTextA
EndDialog
GetDesktopWindow
GetDlgItem
IsWindowEnabled
LoadCursorA
SetCursor
MessageBoxA
GetAsyncKeyState
ExitWindowsEx
GetWindowTextA
GetClassNameA
SetForegroundWindow
SetFocus
GetWindowRect
GetDC
ReleaseDC
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
comctl32
ord17
Sections
.text Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 127KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ucvxnon Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 130KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE