Static task
static1
Behavioral task
behavioral1
Sample
a269246d9f4576186109b644d4d65077_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a269246d9f4576186109b644d4d65077_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a269246d9f4576186109b644d4d65077_JaffaCakes118
-
Size
440KB
-
MD5
a269246d9f4576186109b644d4d65077
-
SHA1
8ea1053b78d9cb82d96634201bee59ae7ad66c0e
-
SHA256
989f2d6473b4035914101c159d209728c96411151ec6ba0a8ed695a29908fc0f
-
SHA512
03629a15f1bb802d4b9c23f6d0ac370c16ee3db5194d78b5833c541f4dab77a73c09b4d4f9c520ae039882aeb76d875d42dd01368c75bb00b405f39bc0d0e50f
-
SSDEEP
6144:i6YQuXfsOboJ0rl7FBo/eeCvOxQl/vcjbOKcaGQSUhxsdsy1DYjCShkYoLpZ+D:ksA/xAC2Q9vcXOjQSUrs640jfkYo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a269246d9f4576186109b644d4d65077_JaffaCakes118
Files
-
a269246d9f4576186109b644d4d65077_JaffaCakes118.exe windows:5 windows x86 arch:x86
f72a7cdf24a34e53c71dc425b5a6c61b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcslen
__CxxFrameHandler
free
malloc
wcscpy
_wcsicmp
_purecall
__RTDynamicCast
wcscmp
swscanf
wcschr
wcsrchr
wcsstr
_wcsnicmp
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_except_handler3
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
atl
ord15
ord22
ord18
ord21
ord16
ord32
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
FreeSid
LookupAccountSidW
RegDeleteValueW
RegOpenKeyW
RegEnumKeyW
RegEnumKeyExW
RegDeleteKeyW
LookupAccountNameW
mpr
WNetGetUniversalNameW
ole32
CoInitialize
StringFromGUID2
CoGetMalloc
StringFromCLSID
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CreateStreamOnHGlobal
ReleaseStgMedium
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantInit
shell32
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
user32
LoadBitmapW
LoadStringW
SetCursor
LoadCursorW
wsprintfW
EnableWindow
SendMessageW
wvsprintfW
MessageBoxW
RegisterClipboardFormatW
SetWindowsHookExW
CallNextHookEx
UnhookWindowsHookEx
MessageBeep
SetParent
ScreenToClient
GetParent
IsWindowVisible
GetWindowRect
GetClientRect
WinHelpW
shlwapi
PathCompactPathW
PathIsUNCW
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upack Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aspack Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.usaa Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uaan Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uaak Size: 406KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uaaj Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ