Static task
static1
Behavioral task
behavioral1
Sample
a50c1572053bc7dc0a3c8eb43e5c0c27_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a50c1572053bc7dc0a3c8eb43e5c0c27_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a50c1572053bc7dc0a3c8eb43e5c0c27_JaffaCakes118
-
Size
82KB
-
MD5
a50c1572053bc7dc0a3c8eb43e5c0c27
-
SHA1
96dc71e881689d97635faa626fd2b42867b7b0bf
-
SHA256
d7d46d685bbda89a71033e99638d2680ceb7767c22de9978c476ae3a8cb079ff
-
SHA512
b867d0e0fb2dda691613f71b00d5b704b9ef1543e3dbeee62626c9a59ddac9a535cbe72542050283d22444fcce3eb6bb0903fbbeb622ef4459d97e0af615e8d8
-
SSDEEP
1536:9jdjur4ptnZjJaQ8HhrzOXJ/iz7oJ/jhBpjLykgAUsg9aNR:PurOtnZXMhrCX9ifobjLyLAUsg+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a50c1572053bc7dc0a3c8eb43e5c0c27_JaffaCakes118
Files
-
a50c1572053bc7dc0a3c8eb43e5c0c27_JaffaCakes118.exe windows:4 windows x86 arch:x86
c214e564ae327e31091d0f82564ecf8c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeA
GetProcAddress
FreeLibrary
FindFirstFileA
GetDiskFreeSpaceA
FindClose
LoadLibraryA
GetModuleFileNameA
GetVersion
GetVersionExA
GetSystemInfo
InterlockedIncrement
InterlockedDecrement
WinExec
GetCurrentProcess
MoveFileExA
GetWindowsDirectoryA
GetShortPathNameA
FindNextFileA
WritePrivateProfileStringA
HeapSize
HeapReAlloc
HeapAlloc
DeleteFileA
RemoveDirectoryA
CreateDirectoryA
GetLocaleInfoW
CloseHandle
GetLocaleInfoA
SetStdHandle
FlushFileBuffers
SetEnvironmentVariableA
CompareStringW
CompareStringA
SetFilePointer
VirtualAlloc
LCMapStringW
LCMapStringA
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
SetEnvironmentVariableW
SetCurrentDirectoryA
GetFullPathNameA
GetCurrentDirectoryA
UnhandledExceptionFilter
FreeEnvironmentStringsA
WriteFile
RtlUnwind
GetStringTypeA
HeapCreate
HeapDestroy
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
ExitProcess
GetLastError
SetFileAttributesA
GetFileAttributesA
MoveFileA
GetCPInfo
GetACP
GetOEMCP
HeapFree
TerminateProcess
GetStringTypeW
GetStdHandle
SetHandleCount
VirtualFree
MultiByteToWideChar
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
WideCharToMultiByte
TlsGetValue
GetFileType
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
user32
DispatchMessageA
SendMessageA
FindWindowA
PostMessageA
TranslateMessage
GetMessageA
RegisterClassA
SetTimer
CreateWindowExA
KillTimer
DefWindowProcA
DestroyWindow
PostQuitMessage
ExitWindowsEx
MessageBoxA
GetSysColor
CreateDialogIndirectParamA
IsWindow
SetWindowPos
GetWindowRect
GetParent
SystemParametersInfoA
EndDialog
UpdateWindow
InvalidateRect
SendDlgItemMessageA
CharNextA
GetSystemMetrics
SetWindowTextA
LoadIconA
BringWindowToTop
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyA
RegOpenKeyExA
RegQueryValueA
RegOpenKeyA
RegSetValueA
RegDeleteKeyA
RegEnumKeyA
RegEnumKeyExA
gdi32
CreateSolidBrush
DeleteObject
SetBkColor
SetTextColor
comctl32
ord17
Sections
.text Size: 56KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ