Static task
static1
Behavioral task
behavioral1
Sample
a583e156688a471a7470e1e91736d800_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
a583e156688a471a7470e1e91736d800_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a583e156688a471a7470e1e91736d800_JaffaCakes118
-
Size
2.7MB
-
MD5
a583e156688a471a7470e1e91736d800
-
SHA1
b4af8411709805b60c73a42f28214cb7f26802d6
-
SHA256
e2a09af3381a3ddc456822bd999e1396713092d1735aad59201e14771f5627ab
-
SHA512
1f3b46b6b80932d9d6054216dafa6faa50196b950f83bbc6cacb51036ae098b455d8a7ccdccc9c4719c0b443963ed04f2c656dc0003321363d41befb61d816a7
-
SSDEEP
49152:uShPxIyaG9URcXll0N8NjvnERVG+cNIGFxN0qnhDTYX:uCxIyH9QcoR8wMnhDEX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a583e156688a471a7470e1e91736d800_JaffaCakes118
Files
-
a583e156688a471a7470e1e91736d800_JaffaCakes118.exe windows:4 windows x86 arch:x86
375843c78b3c20eff2f0df869be40217
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ControlService
CreateServiceA
DeleteService
GetUserNameA
OpenProcessToken
OpenServiceA
QueryServiceConfig2A
RegDeleteValueA
RegEnumKeyExA
RegOpenKeyA
RegSetValueExA
UnlockServiceDatabase
kernel32
AddAtomA
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DeviceIoControl
DisableThreadLibraryCalls
ExitProcess
FindClose
FreeEnvironmentStringsA
FreeLibrary
GetACP
GetCPInfo
GetComputerNameA
GetConsoleCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetFileAttributesA
GetFileTime
GetFullPathNameA
GetLastError
GetModuleHandleA
GetPrivateProfileSectionA
GetProcAddress
GetProcessHeap
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetSystemDirectoryA
GetSystemTime
GetSystemTimeAsFileTime
GetTempPathA
GetThreadTimes
GetVersionExA
GetWindowsDirectoryA
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InitializeCriticalSection
InterlockedIncrement
IsBadCodePtr
IsBadReadPtr
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadResource
LocalFree
LockResource
Module32First
MoveFileA
MoveFileExA
MultiByteToWideChar
OpenEventA
QueryPerformanceCounter
SetEnvironmentVariableA
SetEvent
SetFileTime
SetHandleCount
SetStdHandle
SizeofResource
TlsGetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
WaitForSingleObject
WriteConsoleA
WriteFile
lstrcatA
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
ole32
CoCreateFreeThreadedMarshaler
CoCreateInstance
CoInitializeEx
CreateBindCtx
OleRegGetMiscStatus
user32
BeginPaint
CharNextA
CharUpperA
CheckMenuItem
CopyRect
DispatchMessageA
DrawFocusRect
EnumChildWindows
GetCursorPos
GetDC
GetDlgItem
GetSystemMenu
GetWindow
GetWindowLongA
GetWindowTextLengthA
InflateRect
IntersectRect
IsDlgButtonChecked
IsIconic
IsWindowEnabled
MapWindowPoints
MessageBoxA
PeekMessageA
PostMessageA
PtInRect
RegisterWindowMessageA
ScreenToClient
ShowWindow
TrackPopupMenu
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 39KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 6.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ