Static task
static1
Behavioral task
behavioral1
Sample
a9cd7c7c7214a396a18a1e543c0ac46d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a9cd7c7c7214a396a18a1e543c0ac46d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a9cd7c7c7214a396a18a1e543c0ac46d_JaffaCakes118
-
Size
24KB
-
MD5
a9cd7c7c7214a396a18a1e543c0ac46d
-
SHA1
db58f7d960b11484a7bbb56751bb90fe5a300e51
-
SHA256
ee24e08c8d9ec1ad14257f735e7a5adb58fb30ad422eb9a00122c12b1ceafe58
-
SHA512
330e283b6808af0baaad97e1bfe7626dc2af0571eb2d050eabbf4a014a8bd9b590f35351da5837f5e99533940848abd1e7970691d4ad29fc178b927ab0b9038a
-
SSDEEP
192:q/NWTNQvA1jbwwulbCFABAJ86h/GA1ndQSORPzR/QdmIcybcV:q/a4loKAJ8C/GQdQNRPzR/QD1E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a9cd7c7c7214a396a18a1e543c0ac46d_JaffaCakes118
Files
-
a9cd7c7c7214a396a18a1e543c0ac46d_JaffaCakes118.exe windows:4 windows x86 arch:x86
3d13d78608f81fbcc9e00419bce4362e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord537
ord924
ord923
ord825
ord356
ord2770
ord2781
ord4058
ord3181
ord800
ord668
ord823
msvcrt
_strlwr
_itoa
strstr
strncat
rand
srand
__CxxFrameHandler
_stricmp
strrchr
kernel32
GetCurrentProcess
lstrcatA
GetCurrentThread
GetEnvironmentVariableA
GetShortPathNameA
DuplicateHandle
OpenProcess
CreateJobObjectA
GetCurrentProcessId
SetPriorityClass
Sleep
CreateThread
GetSystemDirectoryA
ExitProcess
GetLastError
CreateMutexA
GetCurrentThreadId
DeleteFileA
FindClose
FindNextFileA
FindFirstFileA
Process32Next
Process32First
CreateToolhelp32Snapshot
ExitThread
GetDriveTypeA
GetLogicalDriveStringsA
SetFileAttributesA
CopyFileA
GetModuleFileNameA
WriteFile
CreateFileA
WinExec
GetCurrentDirectoryA
SetProcessPriorityBoost
SetThreadPriority
lstrcpyA
user32
FindWindowExA
GetWindowTextA
SendMessageA
PostThreadMessageA
GetMessageA
FindWindowA
SetWindowTextA
EnumWindows
GetWindowThreadProcessId
advapi32
RegSetValueExA
RegOpenKeyA
RegDeleteKeyA
ControlService
CloseServiceHandle
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegCreateKeyA
shell32
ShellExecuteA
ShellExecuteExA
SHChangeNotify
ntdll
ZwFreeVirtualMemory
ZwDuplicateObject
ZwOpenProcess
ZwAllocateVirtualMemory
ZwQuerySystemInformation
ZwTerminateJobObject
ZwAssignProcessToJobObject
ZwTerminateProcess
ZwSystemDebugControl
CsrGetProcessId
ZwClose
RtlAdjustPrivilege
ZwQueryInformationProcess
shlwapi
SHDeleteKeyA
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ