Static task
static1
Behavioral task
behavioral1
Sample
89fb77c34f600fc17951ee4ca1064e7f_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
89fb77c34f600fc17951ee4ca1064e7f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89fb77c34f600fc17951ee4ca1064e7f_JaffaCakes118
-
Size
309KB
-
MD5
89fb77c34f600fc17951ee4ca1064e7f
-
SHA1
879995c0f154695f3e7f658624ca04eb4fab8c43
-
SHA256
958f6fa8260e57211ed73d2a31d5563e66a41f5b30d6f7624d31a2124847b1cc
-
SHA512
e97da3a27a3995b3b7760592d2414cad66b8deef1b6c7a8902637bb532cc9125f03bfcc7aeb5304987c28216ae361993ce26bad69b3c6a24f6118cfc5b40d556
-
SSDEEP
6144:ryje74sBYUqovfvILnAq0UhuYwh+JBy/GNK6BO11dnNU6CNQ82sftZMW:rtYAvf+nAq0nX+byiK711dNUPNQ8B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 89fb77c34f600fc17951ee4ca1064e7f_JaffaCakes118
Files
-
89fb77c34f600fc17951ee4ca1064e7f_JaffaCakes118.exe windows:4 windows x86 arch:x86
68fc8e8de15547a781d71d7a0032d05a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
EqualSid
GetSecurityDescriptorControl
GetTokenInformation
LookupAccountSidA
QueryServiceConfig2A
RegFlushKey
RegOpenKeyA
RegOpenKeyExA
RegQueryInfoKeyA
RegSetValueExA
kernel32
CloseHandle
CreateEventA
CreateFileA
CreateFileMappingA
CreateThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DeviceIoControl
DisableThreadLibraryCalls
EnumSystemLocalesA
ExitProcess
ExitThread
ExpandEnvironmentStringsA
FileTimeToLocalFileTime
FindNextFileA
FindResourceA
FlushFileBuffers
FreeEnvironmentStringsA
GetConsoleMode
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFileType
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileSectionA
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemDirectoryA
GetTempFileNameA
GetTickCount
GetTimeZoneInformation
GetVersion
GetVersionExA
GlobalHandle
GlobalLock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsBadWritePtr
IsValidCodePage
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalAlloc
LocalFree
LockResource
MulDiv
OpenEventA
OutputDebugStringA
QueryPerformanceCounter
ReadFile
ReadProcessMemory
RemoveDirectoryA
ResetEvent
SetEnvironmentVariableA
SetErrorMode
SetEvent
SetFilePointer
SetHandleCount
SetLastError
TlsFree
UnmapViewOfFile
VirtualAlloc
VirtualQuery
lstrcmpiA
lstrcpynA
lstrlenA
ole32
CoMarshalInterThreadInterfaceInStream
CreateStreamOnHGlobal
StringFromGUID2
user32
CharLowerA
CheckDlgButton
CopyRect
DefWindowProcA
EnumChildWindows
FillRect
FindWindowA
GetCapture
GetClientRect
GetDC
GetDlgCtrlID
GetMenuItemCount
GetSystemMetrics
GetWindow
GetWindowPlacement
GetWindowRect
InflateRect
KillTimer
MessageBoxA
OffsetRect
PeekMessageA
ReleaseDC
ScreenToClient
SetCapture
SetDlgItemInt
SetFocus
SetForegroundWindow
SetWindowPos
ShowWindow
TrackPopupMenu
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 55KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.adata Size: 79KB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ