Static task
static1
Behavioral task
behavioral1
Sample
86c6d546a6d5118a267878cd207cccb2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
86c6d546a6d5118a267878cd207cccb2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
86c6d546a6d5118a267878cd207cccb2_JaffaCakes118
-
Size
56KB
-
MD5
86c6d546a6d5118a267878cd207cccb2
-
SHA1
0c926011070f0a0496279d384394ab435f2ba092
-
SHA256
fe64e308aea6453f4e75bf0d5feb967bea6f8e5279bb878f1e257bafdbe6eee1
-
SHA512
a40e429409f3fced0fa3b2e96eb6d0e5324e33345ec1d9d16aad30a76a54369e48af64612541e0eed1cc799b1197395e919fdd822e718e0fa0f81ffa9522156d
-
SSDEEP
1536:PB7GwqmxDNaM4jZvfrL274pcVkHIg7u1SibR:5qmLz4vHYlkogKf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 86c6d546a6d5118a267878cd207cccb2_JaffaCakes118
Files
-
86c6d546a6d5118a267878cd207cccb2_JaffaCakes118.exe windows:4 windows x86 arch:x86
54a9fe283bd923bdd921c4c8b0206eca
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ChangeServiceConfigA
CloseServiceHandle
DeleteService
LockServiceDatabase
OpenServiceA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
kernel32
CreateEventA
CreateFileA
CreateProcessA
CreateThread
DeleteAtom
DeleteFileA
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FindClose
FreeLibrary
GetACP
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetEnvironmentVariableA
GetFileTime
GetFileType
GetLastError
GetModuleHandleA
GetPrivateProfileSectionA
GetPrivateProfileSectionNamesA
GetProcessHeap
GetStdHandle
GetSystemDirectoryA
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetThreadLocale
GetTickCount
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalReAlloc
HeapCreate
HeapFree
HeapSize
InitializeCriticalSection
InterlockedDecrement
IsBadCodePtr
IsBadWritePtr
LoadLibraryA
LocalFree
MapViewOfFile
OpenProcess
QueryPerformanceCounter
ReadFile
ReadProcessMemory
RemoveDirectoryA
RtlUnwind
SetCurrentDirectoryA
SetFilePointer
SetFileTime
SetLastError
SetStdHandle
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
TerminateProcess
TlsAlloc
TlsFree
UnmapViewOfFile
VirtualFree
VirtualQuery
WaitForSingleObject
WriteFile
WritePrivateProfileStringA
lstrcmpA
user32
CallNextHookEx
CharUpperA
ClientToScreen
CreateDialogParamA
CreateWindowExA
DestroyWindow
DialogBoxParamA
DrawFocusRect
DrawIcon
EndDialog
EndPaint
GetCapture
GetKeyState
GetWindowDC
GetWindowThreadProcessId
IsIconic
IsWindow
MessageBoxA
PostMessageA
RegisterClipboardFormatA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
SendMessageA
SetWindowLongA
SetWindowTextA
SystemParametersInfoA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 13KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ