Static task
static1
Behavioral task
behavioral1
Sample
a2208a161f4da37467017ab44e775868_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a2208a161f4da37467017ab44e775868_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a2208a161f4da37467017ab44e775868_JaffaCakes118
-
Size
56KB
-
MD5
a2208a161f4da37467017ab44e775868
-
SHA1
2b9faf57b596f9dd7ca597a5929a9194b33d0144
-
SHA256
27806c3f180822bf5435b2894b100f9ea69ec72322669fdccc07c5d175237fdd
-
SHA512
3bb4e26df87c219d7bbc788ed86169688f737f27e9924b1bde98b359ee367599f4147701cd9424904d81b918efe1da4abbbd15e43de2b2ba29a76269f18c42ab
-
SSDEEP
768:e6CuPELuRxWabLV6HT3a48EqHBMnx6gPJ2qrYFe7ORiwGKmUQzVqJ6:9uu7XH/vOHPMqreVcP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2208a161f4da37467017ab44e775868_JaffaCakes118
Files
-
a2208a161f4da37467017ab44e775868_JaffaCakes118.exe windows:4 windows x86 arch:x86
060b3802ff6ab4fae9d43da67f25e070
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileW
GetShortPathNameW
InitializeCriticalSection
GetExitCodeThread
RemoveDirectoryW
GetWindowsDirectoryW
QueryPerformanceCounter
SetUnhandledExceptionFilter
CreateDirectoryW
Sleep
GetTickCount
GetFileAttributesW
lstrcpynA
lstrlenA
GetLastError
GetFullPathNameA
GetFileAttributesA
lstrcpynW
lstrlenW
GetCurrentProcess
FreeLibrary
MultiByteToWideChar
LoadLibraryW
SetEvent
WaitForSingleObject
GetCurrentThread
GetModuleFileNameW
CreateEventW
GetVersionExW
GetCurrentThreadId
GetCurrentProcessId
GetProcAddress
user32
PeekMessageW
advapi32
EqualSid
SetThreadToken
DuplicateToken
RegDeleteValueW
RegSetValueExW
RegCloseKey
RegCreateKeyExW
RegQueryValueExW
RegEnumKeyExW
RegOpenKeyExW
AllocateAndInitializeSid
GetTokenInformation
OpenThreadToken
FreeSid
RegDeleteKeyW
RegDeleteKeyA
RegEnumValueW
RegEnumKeyW
RegUnLoadKeyW
RegLoadKeyW
AdjustTokenPrivileges
LookupPrivilegeValueW
OpenProcessToken
DuplicateTokenEx
RevertToSelf
shell32
SHGetDesktopFolder
serialui
drvCommConfigDialogA
drvGetDefaultCommConfigA
drvSetDefaultCommConfigA
wmi
GetTraceEnableLevel
WmiSetSingleInstanceW
SetTraceCallback
Sections
.text Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.gkQ Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.J Size: 4KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.HzaQz Size: 1KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.SNYy Size: 512B - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xTReP Size: 8KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DGydnY Size: 11KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ