Static task
static1
Behavioral task
behavioral1
Sample
8b5c35983b694f1c898def2e43679cee_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8b5c35983b694f1c898def2e43679cee_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b5c35983b694f1c898def2e43679cee_JaffaCakes118
-
Size
24KB
-
MD5
8b5c35983b694f1c898def2e43679cee
-
SHA1
57a2d47671f6ebc6b02cd17b37d80fb2655e6b52
-
SHA256
5a27607c27e57fdb0164c04fe393f49230175bce674058eb14ee8d50ee49f481
-
SHA512
542eb1628b0710c4184dd843fe3fbdcd43b9ee3d49d9e4440fbb8164a9dc6a309d590e0c98e170b13afae66b17fcebadd39337ac9db899fdbc0d9d7d53aeb8f3
-
SSDEEP
384:PWrL9ZPAF3ypTDU6cdIRuK+jyOB8nDOQwaVAw2YtqdUA+7O:OrDQ3ypTDVcdvK+eM8KwVsdEO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8b5c35983b694f1c898def2e43679cee_JaffaCakes118
Files
-
8b5c35983b694f1c898def2e43679cee_JaffaCakes118.exe windows:4 windows x86 arch:x86
8688dd222b161af0e9bfb08c7aec6806
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
WritePrivateProfileStringA
GetSystemTimeAsFileTime
LoadLibraryA
WriteConsoleW
QueryPerformanceCounter
InitializeCriticalSection
EnterCriticalSection
ExitProcess
CreateFileA
LeaveCriticalSection
TerminateProcess
VirtualAlloc
WriteProfileSectionW
WritePrivateProfileSectionA
DeleteCriticalSection
UnhandledExceptionFilter
FreeLibrary
WriteProfileStringA
GetCurrentProcessId
InterlockedDecrement
WideCharToMultiByte
GetLastError
GetCurrentProcess
LoadResource
GetCurrentThreadId
GetTickCount
SetUnhandledExceptionFilter
LockResource
GetProcAddress
Sleep
MultiByteToWideChar
LocalFree
SizeofResource
InterlockedIncrement
CloseHandle
ws2_32
socket
closesocket
WSAStartup
WSACleanup
setsockopt
listen
send
bind
accept
WSALookupServiceNextA
oleaut32
SysStringByteLen
SysAllocStringByteLen
SysAllocStringLen
GetActiveObject
SysFreeString
VariantCopyInd
VariantClear
SafeArrayCreate
VariantCopy
SysReAllocStringLen
user32
DestroyWindow
ShowWindow
GetParent
GetDC
LoadStringW
GetClientRect
GetSystemMetrics
wsprintfA
ArrangeIconicWindows
ReleaseDC
EnableWindow
AnimateWindow
MessageBoxA
TranslateMessage
GetDlgItem
GetWindowRect
BeginPaint
EndDialog
advapi32
RegQueryValueExW
RegDeleteKeyA
GetTokenInformation
RegDeleteKeyW
ObjectCloseAuditAlarmA
RegEnumKeyExW
AddAccessAllowedAce
InitializeSecurityDescriptor
RegCreateKeyExW
RegEnumValueW
RegCloseKey
RegQueryInfoKeyW
RegOpenKeyExW
FreeSid
OpenThreadToken
AccessCheckByTypeResultListAndAuditAlarmByHandleW
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
AccessCheckByTypeAndAuditAlarmA
RegOpenKeyExA
RegSetValueExA
GetLengthSid
OpenProcessToken
AllocateAndInitializeSid
RegEnumKeyExA
CloseServiceHandle
RegSetValueExW
RegDeleteValueW
msvcrt
__doserrno
_chdir
_cabs
_access
_close
_c_exit
_cgetws
_beep
_atoldbl
__set_app_type
_atoi64
_chgsign
_assert
_cgets
__threadid
ole32
CoCreateObjectInContext
CoCreateInstance
CLSIDFromProgIDEx
CLSIDFromProgID
BindMoniker
CoCreateInstanceEx
CLIPFORMAT_UserSize
CLIPFORMAT_UserMarshal
PropVariantChangeType
CLIPFORMAT_UserFree
CLSIDFromOle1Class
CLIPFORMAT_UserUnmarshal
ws2help
WahCloseThread
WahCloseHandleHelper
WahCompleteRequest
WahCloseSocketHandle
WahCloseNotificationHandleHelper
comdlg32
PageSetupDlgA
GetSaveFileNameA
WantArrows
PrintDlgA
GetOpenFileNameA
LoadAlterBitmap
CommDlgExtendedError
dwLBSubclass
dwOKSubclass
ChooseColorA
GetFileTitleA
PrintDlgExA
ChooseFontA
FindTextA
ReplaceTextA
Sections
BSS Size: - Virtual size: 12KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 393B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ