Static task
static1
Behavioral task
behavioral1
Sample
9458d3d7cb6f68be2061d1b07d67cb3b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9458d3d7cb6f68be2061d1b07d67cb3b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9458d3d7cb6f68be2061d1b07d67cb3b_JaffaCakes118
-
Size
62KB
-
MD5
9458d3d7cb6f68be2061d1b07d67cb3b
-
SHA1
9c33dd0a27aca4ea0a1a2283f0ea6c125e2d644b
-
SHA256
8bf065e691530d409ee861d6bd234aa6375645bcfc6e772e55b0120db6cd2996
-
SHA512
e7480c14484185dcaab0a886db45cf3db122c8e78ca17de3c6b958c5f8e8acd9dcfd4aef1ee04ec0af9d9632de6a15d85ea09666238e984e92a57a90c97726ea
-
SSDEEP
768:9Oq3FpV2I55VJEtxE13wNbQwStA1OJKe5xZJM4WMT0yQdscD:P1p95d+xE1aQo8DrM4J0Dj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9458d3d7cb6f68be2061d1b07d67cb3b_JaffaCakes118
Files
-
9458d3d7cb6f68be2061d1b07d67cb3b_JaffaCakes118.exe windows:4 windows x86 arch:x86
c708370ccc04c8873be52f03d777aeac
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WinExec
CreateDirectoryA
GetComputerNameA
GlobalMemoryStatus
GetVersionExA
ExitProcess
VirtualProtect
GetModuleHandleA
UnmapViewOfFile
MapViewOfFile
SetFileTime
GetCurrentProcessId
CreateFileMappingA
MultiByteToWideChar
GetTickCount
CreateMutexA
ReleaseMutex
OpenMutexA
GetCommandLineA
GetFileTime
GetDriveTypeA
GetDiskFreeSpaceExA
GetVolumeInformationA
RemoveDirectoryA
DeleteFileA
LocalLock
LocalUnlock
WideCharToMultiByte
GetEnvironmentVariableA
PeekNamedPipe
CreateThread
Sleep
HeapFree
GetFullPathNameA
LoadLibraryA
GetProcAddress
FreeLibrary
GetTempPathA
GetTempFileNameA
CreatePipe
CreateProcessA
WaitForSingleObject
ReadFile
GetLastError
TerminateProcess
VirtualFree
VirtualAlloc
GetModuleFileNameA
GetSystemDirectoryA
MoveFileA
CopyFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
LocalAlloc
LocalFree
GetCurrentProcess
CloseHandle
FindFirstFileA
FindNextFileA
FindClose
GetWindowsDirectoryA
CreateFileA
GetFileSize
SetFilePointer
GetLocalTime
WriteFile
GetProcessHeap
HeapAlloc
VirtualQuery
user32
wsprintfA
GetClientRect
GetDesktopWindow
DrawTextExA
GetIconInfo
ExitWindowsEx
MessageBoxA
gdi32
CreateDCA
CreateFontA
SetTextColor
SetBkColor
SetBkMode
DeleteObject
DeleteDC
GetObjectA
GetBitmapBits
BitBlt
CreateCompatibleBitmap
CreateCompatibleDC
GetDeviceCaps
GetDIBits
SelectObject
advapi32
CreateServiceA
CloseServiceHandle
ChangeServiceConfig2A
RegCreateKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
GetUserNameA
LsaNtStatusToWinError
LookupAccountSidA
DuplicateTokenEx
ImpersonateLoggedOnUser
CreateProcessAsUserA
GetSecurityInfo
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
AllocateAndInitializeSid
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessDeniedAce
SetSecurityInfo
FreeSid
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
StartServiceCtrlDispatcherA
StartServiceA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenServiceA
DeleteService
OpenSCManagerA
shell32
SHGetFileInfoA
ntdll
ZwQuerySystemInformation
memmove
wcscpy
ZwTerminateThread
NtVdmControl
RtlInitUnicodeString
ZwOpenSection
_chkstk
sprintf
vsprintf
ZwClose
ws2_32
inet_addr
WSAStartup
htonl
bind
WSAGetLastError
listen
ntohs
send
accept
getpeername
recv
closesocket
connect
socket
gethostbyname
inet_ntoa
htons
__WSAFDIsSet
select
ioctlsocket
mpr
WNetEnumResourceA
WNetOpenEnumA
WNetCloseEnum
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ