Static task
static1
Behavioral task
behavioral1
Sample
96351fd5740d65f2cb67b6511c0571c5_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
96351fd5740d65f2cb67b6511c0571c5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
96351fd5740d65f2cb67b6511c0571c5_JaffaCakes118
-
Size
264KB
-
MD5
96351fd5740d65f2cb67b6511c0571c5
-
SHA1
f9b3956818f876c59972c3691d07e89263fc0e05
-
SHA256
1379d7f55dd1d4cb1ac14ca6cb76a21dee7377fe3537697a5fdd468f7b124363
-
SHA512
a9ac9b196359486f86631cb6c24365452c81ede19e8cea941cfcd7189080b0ff59093952ed1324ea09bd7ce45d03679ac6453140ef725d0d6685a7db1e07f945
-
SSDEEP
6144:JoBRISAYDI15EAR/CJR4NANuQ01Whw90BEZlkqoI:6I2I15EAR/KRHNuYsIdI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 96351fd5740d65f2cb67b6511c0571c5_JaffaCakes118
Files
-
96351fd5740d65f2cb67b6511c0571c5_JaffaCakes118.exe windows:4 windows x86 arch:x86
cbb26d74463a8965c7960ad3505c4ca4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2764
ord2763
ord6662
ord4278
ord533
ord5194
ord3811
ord540
ord3337
ord537
ord2818
ord6407
ord1997
ord798
ord535
ord823
ord825
ord5683
ord5710
ord941
ord860
ord939
ord4129
ord858
ord3183
ord536
ord2915
ord5572
ord800
ord354
ord5186
ord5773
ord5442
ord1979
ord665
msvcrt
_exit
_onexit
__dllonexit
_strnicmp
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
strstr
_vsnprintf
memcpy
wcslen
printf
_wcsicmp
_mbscmp
sprintf
strcpy
strcat
memset
__CxxFrameHandler
strlen
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_stricmp
kernel32
Process32Next
GetCurrentProcess
MultiByteToWideChar
FindResourceA
LoadResource
LockResource
SizeofResource
WriteFile
Process32First
SetFileAttributesA
GetSystemDirectoryA
FindFirstFileA
CopyFileA
GetStartupInfoA
CreateProcessA
CreateFileA
GetFileSize
ReadFile
CreateToolhelp32Snapshot
UnmapViewOfFile
ReadProcessMemory
MapViewOfFile
CreateFileMappingA
WriteProcessMemory
VirtualProtectEx
VirtualQueryEx
OpenProcess
GetLastError
OutputDebugStringA
CreateRemoteThread
GetProcAddress
SetFileTime
FindClose
CreateThread
GetLocalTime
SetLocalTime
CreatePipe
GetStdHandle
GetVersion
GetCurrentProcessId
Sleep
lstrcatA
LoadLibraryA
FreeLibrary
lstrlenA
VirtualAllocEx
ExitProcess
GetModuleFileNameA
CloseHandle
GetModuleHandleA
user32
PostMessageA
FindWindowExA
MessageBoxA
FindWindowA
advapi32
AdjustTokenPrivileges
OpenProcessToken
DeregisterEventSource
ReportEventA
RegisterEventSourceA
CloseServiceHandle
StartServiceA
RegOpenKeyA
CreateServiceA
OpenSCManagerA
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
RegEnumValueA
LookupPrivilegeValueA
shell32
ShellExecuteA
msvcp60
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?get@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADHD@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?cerr@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
Sections
.text Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ