Static task
static1
Behavioral task
behavioral1
Sample
95cfbb9abc55fcd829b246c633cdd75b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
95cfbb9abc55fcd829b246c633cdd75b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
95cfbb9abc55fcd829b246c633cdd75b_JaffaCakes118
-
Size
108KB
-
MD5
95cfbb9abc55fcd829b246c633cdd75b
-
SHA1
4079db5f5043b4e88da969ffcfaa7c6a7dfe7828
-
SHA256
2af4460e14d705688d88f8c0d9029683816c6a2519de0602818e696cedcc2f16
-
SHA512
7b832d98bbcc73fca835fad620250a2d1ed679571bffb359c1e2d3359e92098eb47c4be30cf649818cf9f33f001a293bdc81ce8c3228890e300384abd72a053c
-
SSDEEP
3072:V6p5KXPdwLbW9glGnWuYGZw4KKV3cPoM28Bj6:V6KXFwHyglFHFfgKJ6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 95cfbb9abc55fcd829b246c633cdd75b_JaffaCakes118
Files
-
95cfbb9abc55fcd829b246c633cdd75b_JaffaCakes118.exe windows:4 windows x86 arch:x86
db0a325cd3850685b9598895583341fa
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
storm
ord403
ord501
ord401
ord426
ord425
ord422
ord423
ord578
d2gfx
ord10020
ord10018
ord10015
ord10027
ord10001
ord10011
d2mcpclient
ord10001
d2sound
ord10000
ord10001
d2win
ord10001
ord10000
ord10036
ord10002
ord10171
ord10174
ord10205
ord10037
fog
ord10042
ord10089
ord10082
ord10021
ord10043
ord10101
ord10218
ord10227
ord10090
ord10143
ord10116
ord10019
advapi32
RegCloseKey
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenServiceA
OpenSCManagerA
CloseServiceHandle
StartServiceCtrlDispatcherA
CreateServiceA
RegCreateKeyA
RegEnumValueA
RegSetValueExA
RegOpenKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
kernel32
GetModuleFileNameA
GetStdHandle
GetFileType
SetHandleCount
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
CloseHandle
GetUserDefaultLCID
GetPrivateProfileStringA
GetPrivateProfileIntA
GetCurrentDirectoryA
GetProcAddress
GetLastError
LoadLibraryA
FreeLibrary
SetCurrentDirectoryA
SetEvent
OpenEventA
HeapDestroy
GetModuleHandleA
GetVersion
SetEnvironmentVariableA
CompareStringW
GetStartupInfoA
GetCommandLineA
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetCurrentThread
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
EnumSystemLocalesA
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
GetEnvironmentVariableA
GetVersionExA
HeapAlloc
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
IsValidCodePage
GetLocaleInfoA
HeapReAlloc
InitializeCriticalSection
FatalAppExitA
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
IsBadWritePtr
SetStdHandle
Sleep
LCMapStringA
LCMapStringW
FlushFileBuffers
IsValidLocale
user32
MessageBoxA
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE