Static task
static1
Behavioral task
behavioral1
Sample
948fcbf468a5fbaeea72cb10cb8ea68b_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
948fcbf468a5fbaeea72cb10cb8ea68b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
948fcbf468a5fbaeea72cb10cb8ea68b_JaffaCakes118
-
Size
369KB
-
MD5
948fcbf468a5fbaeea72cb10cb8ea68b
-
SHA1
0cc799bc5d44784c15e81010c67e9d9819bd7755
-
SHA256
ed1de59e4ce3bef270754960b75f74e4fa22096fc938edcdc87c8f6011ae82fb
-
SHA512
53661eee480c365d577b260d54b60277cc45e3d1d6c4a7dca6be61e5db0001ffda14176d1aba193e1aa7e6871a9f4db0bf4d55a89e8354fcbbd97fcc3f8f4ff1
-
SSDEEP
6144:EkTT/Ntd0khc2M5mi9d/SAgbBYpt/8cYPPs5rorm9MXrTn8SlcM7vWxfKAVo4Zgm:EYNtd0kOme1gbBS8d4oaiXP8eFsuc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 948fcbf468a5fbaeea72cb10cb8ea68b_JaffaCakes118
Files
-
948fcbf468a5fbaeea72cb10cb8ea68b_JaffaCakes118.exe windows:4 windows x86 arch:x86
ba3f7b4ebf16271d2c275639adee3c8e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ddraw
DirectDrawEnumerateA
samlib
SamRemoveMultipleMembersFromAlias
SamConnectWithCreds
SamTestPrivateFunctionsUser
SamiEncryptPasswords
msi
MsiDatabaseCommit
MsiAdvertiseProductW
MsiConfigureFeatureW
user32
CallMsgFilterW
kernel32
GetStdHandle
GetTempPathA
IsDBCSLeadByte
HeapCreate
FindResourceA
_lwrite
CompareStringW
GlobalSize
GetUserDefaultLangID
SetCurrentDirectoryA
LCMapStringW
GetSystemDefaultLangID
GetCurrentProcessId
CompareStringA
LoadResource
HeapReAlloc
IsBadReadPtr
GetStringTypeExA
VirtualFree
LCMapStringA
SetFileTime
GetModuleFileNameW
LoadLibraryA
GlobalDeleteAtom
SetLocalTime
SetStdHandle
GetShortPathNameA
GetFileType
FreeEnvironmentStringsW
lstrcpyA
GetModuleFileNameA
SetHandleCount
VirtualProtect
GetEnvironmentStrings
FindClose
HeapFree
FlushFileBuffers
lstrcpynA
FormatMessageW
ReleaseSemaphore
FormatMessageA
GetWindowsDirectoryA
FileTimeToSystemTime
GetVersion
GetStringTypeW
GetVolumeInformationA
GetOEMCP
CreateProcessW
SetEvent
InterlockedIncrement
SetEndOfFile
GlobalAddAtomA
GetSystemDefaultLCID
GetExitCodeProcess
GetTickCount
FindNextFileA
GetCurrentDirectoryA
RtlUnwind
WaitForSingleObject
MulDiv
LockFile
SetEnvironmentVariableA
LeaveCriticalSection
LockResource
CreateSemaphoreA
GetLocaleInfoA
IsBadCodePtr
GlobalFree
GetStartupInfoA
GetStringTypeA
VirtualQuery
GetVersionExA
RemoveDirectoryA
Sleep
VirtualAlloc
ExitProcess
DuplicateHandle
GetLocalTime
UnlockFile
SetErrorMode
GetTimeZoneInformation
WriteFile
GetFullPathNameA
TlsAlloc
GetLastError
lstrcmpiW
GetProcAddress
ExitThread
SearchPathA
FreeEnvironmentStringsA
GetACP
lstrcmpA
GetDriveTypeA
GetSystemTime
GetTempFileNameA
SetLastError
lstrlenA
MoveFileA
_lclose
HeapAlloc
FreeLibrary
GlobalAlloc
WinExec
FreeResource
FileTimeToLocalFileTime
GlobalUnlock
CreateEventA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 277KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE