Static task
static1
Behavioral task
behavioral1
Sample
ab153afbfbcfc8c67cf055b0111f0003_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ab153afbfbcfc8c67cf055b0111f0003_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ab153afbfbcfc8c67cf055b0111f0003_JaffaCakes118
-
Size
56KB
-
MD5
ab153afbfbcfc8c67cf055b0111f0003
-
SHA1
af3e232559ef69bdf2ee9cd96434dcec58afbe5a
-
SHA256
a485d23c6e389e2f216341cbe6cedfb0df7882450cf1c7d8f3d31b47fdded26a
-
SHA512
dbce24236272b1e8dbefcf759905b1747a02c105b87f065a61bba2833489476f1ce60c2c6b0abdccb96dd98c6c814d176d3ad41988bec7a8096ca9cd2c0b7bdf
-
SSDEEP
1536:R9zNGoB1geO4rVLUePB5aKYQR+/Vsd0pztw:zNB1ge5pUePB5aKrR+/Vsd6y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab153afbfbcfc8c67cf055b0111f0003_JaffaCakes118
Files
-
ab153afbfbcfc8c67cf055b0111f0003_JaffaCakes118.exe windows:4 windows x86 arch:x86
9c0923fb84eb4e8424b109f6c7b987af
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
SetSecurityInfo
SetEntriesInAclA
AdjustTokenPrivileges
LookupPrivilegeValueA
GetTokenInformation
OpenProcessToken
GetUserNameA
LookupAccountSidA
RegEnumKeyExA
RegOpenKeyExA
RegEnumValueA
RegDeleteValueA
wsock32
closesocket
WSAStartup
WSACleanup
socket
htons
ioctlsocket
inet_ntoa
select
recv
gethostname
gethostbyname
inet_addr
WSAGetLastError
mpr
WNetCloseEnum
shlwapi
SHGetValueA
SHSetValueA
SHDeleteKeyA
SHDeleteValueA
netapi32
NetApiBufferFree
NetGetDCName
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoCreateInstance
msvcrt
isalpha
exit
atoi
_exit
_XcptFilter
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
swprintf
fwrite
fopen
isdigit
fread
fclose
rename
strrchr
_strnicmp
memset
strstr
strchr
memcpy
strcmp
memcmp
free
time
srand
rand
sprintf
strcpy
strcat
malloc
strlen
_EH_prolog
__CxxFrameHandler
fseek
fscanf
_access
strncpy
_itoa
kernel32
GetPriorityClass
GetStartupInfoA
PeekNamedPipe
ReadFile
Sleep
GetModuleHandleA
CreateFileA
WriteFile
GetModuleFileNameA
DeleteFileA
GetCurrentProcess
DuplicateHandle
CreateProcessA
MultiByteToWideChar
GlobalAlloc
GlobalFree
GetFileTime
SetFileTime
GetSystemTime
SystemTimeToFileTime
CompareFileTime
GetFileSize
GetLocalTime
CopyFileA
RemoveDirectoryA
GetLastError
LocalFree
GetLogicalDriveStringsA
GetDriveTypeA
GetVolumeInformationA
GetVersionExA
GetSystemDefaultLangID
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
FindClose
GetComputerNameA
OpenMutexA
CloseHandle
SetEvent
WaitForSingleObject
CreateMutexA
CreateDirectoryA
GetFileAttributesA
SetFileAttributesA
CreateEventA
CreateThread
GetTickCount
LoadLibraryA
GetProcAddress
FreeLibrary
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ