Static task
static1
Behavioral task
behavioral1
Sample
a38a8a1930420f7de3264f0372c725ff_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a38a8a1930420f7de3264f0372c725ff_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a38a8a1930420f7de3264f0372c725ff_JaffaCakes118
-
Size
2.7MB
-
MD5
a38a8a1930420f7de3264f0372c725ff
-
SHA1
56db24413fa102d9ba59bdc588aa181ab8ef3d1b
-
SHA256
98573fdc794b6b46f7597b836f607a90a856dc6766f660a1fbd1f40c6a2e9386
-
SHA512
4f2c1e1ac2d234163fca9fce18e895001bd39890bd4b3d34850439eeddd474bbb3ecb76bbc9293ded6298ac6570ee7f1298abcf33058f3430dccb26c81b698d7
-
SSDEEP
49152:66Ad734MPOhcNZ8Rsy5ihD2u5VZ1Htj13r6nOAgbhJS:66AdcMPiUy6D2AVZ1Htj1+ey
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a38a8a1930420f7de3264f0372c725ff_JaffaCakes118
Files
-
a38a8a1930420f7de3264f0372c725ff_JaffaCakes118.exe windows:4 windows x86 arch:x86
3b185e7145ddd9436cbf2445ad717a5e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CloseServiceHandle
ControlService
GetUserNameA
InitializeSecurityDescriptor
LockServiceDatabase
OpenProcessToken
RegDeleteValueA
RegQueryValueExA
kernel32
AddAtomA
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateThread
DeleteCriticalSection
DisableThreadLibraryCalls
ExitProcess
ExitThread
FileTimeToLocalFileTime
FindResourceA
FlushFileBuffers
GetConsoleMode
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetFileSize
GetLastError
GetLocalTime
GetModuleHandleA
GetPrivateProfileSectionA
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempFileNameA
GetTickCount
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapReAlloc
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadWritePtr
IsValidCodePage
IsValidLocale
LCMapStringA
LeaveCriticalSection
LocalAlloc
LocalFree
LockResource
MapViewOfFile
Module32First
MoveFileA
MultiByteToWideChar
ReadFile
RtlUnwind
SetEndOfFile
SetEvent
SetFileAttributesA
SetFilePointer
SetPriorityClass
SystemTimeToFileTime
TlsFree
TlsSetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
WaitForSingleObject
WriteConsoleA
WriteFile
lstrcatA
lstrcmpA
lstrcmpiA
lstrcpynA
ole32
CoCreateFreeThreadedMarshaler
CoCreateInstance
StringFromGUID2
user32
CharPrevA
CharUpperA
ClientToScreen
DefWindowProcA
DispatchMessageA
EnableMenuItem
EnableWindow
EqualRect
FindWindowA
GetClassNameA
GetDlgItemTextA
GetFocus
GetForegroundWindow
GetMessageA
GetSysColor
GetSysColorBrush
GetWindowTextA
GetWindowThreadProcessId
IsRectEmpty
IsWindowEnabled
LoadCursorA
LoadStringA
MessageBoxA
SendMessageA
SetDlgItemTextA
SetForegroundWindow
TrackPopupMenu
UnregisterClassA
WinHelpA
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 38KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 6.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ