Static task
static1
Behavioral task
behavioral1
Sample
976f5336536e691e0395eadd172c09b5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
976f5336536e691e0395eadd172c09b5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
976f5336536e691e0395eadd172c09b5_JaffaCakes118
-
Size
105KB
-
MD5
976f5336536e691e0395eadd172c09b5
-
SHA1
118f8113f5aeb6a2a2019e5f2155189e3f6e3f7b
-
SHA256
b2aeeb4c0ef9514322bcdbe6e6aa5ac14e89468c1bd89f1c9bcbc4c8b2cd4083
-
SHA512
7fa1f30cb44f83212433aa7051c8c49bdf861d57fcb70a53e0cb7dbcc76aac64a2aeca095925738b16e4c9c0430c45426f323542ff7d63671348f7a84c3071b5
-
SSDEEP
1536:5NrTZSSJw8oD5mmiKoBHgiLUffXWpkSv8652xDc7Q+BYrj76M:fTZhzoGlvLUnmn860c7LgX6M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 976f5336536e691e0395eadd172c09b5_JaffaCakes118
Files
-
976f5336536e691e0395eadd172c09b5_JaffaCakes118.exe windows:4 windows x86 arch:x86
2fcd15091d67bfd9c29a248c69305b05
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
EnterCriticalSection
FindClose
FreeLibrary
GetACP
GetCPInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetModuleFileNameA
GetPrivateProfileSectionNamesA
GetProcAddress
GetStartupInfoA
GetSystemInfo
GetTempFileNameA
GetTempPathA
GetTimeFormatA
GetVersion
GetWindowsDirectoryA
GlobalAlloc
HeapCreate
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsValidCodePage
LoadLibraryA
LoadResource
Module32First
ReleaseMutex
RtlUnwind
SetCurrentDirectoryA
SetFileAttributesA
SetFilePointer
SuspendThread
TlsSetValue
VirtualAlloc
user32
CallWindowProcA
CharNextA
CharPrevA
CharUpperA
CreateDialogParamA
CreateWindowExA
DefWindowProcA
DestroyMenu
DestroyWindow
DrawIcon
EnableWindow
EndPaint
EnumChildWindows
GetClientRect
GetDC
GetMessageA
GetParent
GetWindowLongA
GetWindowTextLengthA
IsRectEmpty
LoadBitmapA
LoadCursorA
LoadImageA
MoveWindow
PeekMessageA
RegisterClipboardFormatA
SetDlgItemTextA
SetWindowRgn
SetWindowTextA
TrackPopupMenu
UnregisterClassA
UpdateWindow
wsprintfA
advapi32
AdjustTokenPrivileges
ChangeServiceConfig2A
ChangeServiceConfigA
CloseServiceHandle
ControlService
GetSecurityDescriptorControl
GetUserNameA
InitializeSecurityDescriptor
LockServiceDatabase
LookupAccountSidA
OpenProcessToken
OpenSCManagerA
QueryServiceStatus
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegFlushKey
RegOpenKeyA
RegOpenKeyExA
RegQueryValueA
RegQueryValueExA
RegSetValueExA
SetSecurityDescriptorDacl
SetServiceStatus
UnlockServiceDatabase
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ