Static task
static1
Behavioral task
behavioral1
Sample
b5174537da4509c304790e49bb75475e_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b5174537da4509c304790e49bb75475e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b5174537da4509c304790e49bb75475e_JaffaCakes118
-
Size
274KB
-
MD5
b5174537da4509c304790e49bb75475e
-
SHA1
605d93e788a5e6ee2bfcef4a3c6bddcf292720e7
-
SHA256
1f9089f3822a2520f8c679fb3b71259facb38ee7f130fc07f1af3f3148bb0665
-
SHA512
6556b412af0f1787c661c92ce62a101043e554d23e9ac089e3511a74cfd455a4d5891ccf7ba5752468ec8b4c111bc1b866dbd89fee488bcb54d6dedcf0b612d5
-
SSDEEP
6144:bqPEwC7OWP1x9sRWopvLfBoQQZlrtjcIbnp51jJTyEc2p8:VwCCE9sYopDfBzQZlRIIbn5pyl22
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b5174537da4509c304790e49bb75475e_JaffaCakes118
Files
-
b5174537da4509c304790e49bb75475e_JaffaCakes118.exe windows:4 windows x86 arch:x86
f7ec0794e31831558b7f35e8aa899120
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
EqualSid
GetTokenInformation
OpenServiceA
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegQueryInfoKeyA
RegQueryValueA
UnlockServiceDatabase
kernel32
CreateEventA
CreateFileA
CreateThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DeleteFileA
DeviceIoControl
DisableThreadLibraryCalls
EnterCriticalSection
ExitProcess
FindFirstFileA
FindNextFileA
FreeEnvironmentStringsA
FreeLibrary
GetCommandLineA
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetExitCodeProcess
GetFileSize
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileSectionNamesA
GetPrivateProfileStringA
GetProcessHeap
GetShortPathNameA
GetStartupInfoA
GetStdHandle
GetStringTypeA
GetSystemTimeAsFileTime
GetTempPathA
GetThreadTimes
GetTickCount
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalUnlock
HeapAlloc
HeapDestroy
HeapFree
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsValidCodePage
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFree
MoveFileA
MoveFileExA
OpenEventA
OpenProcess
QueryPerformanceCounter
RaiseException
ReadFile
ReadProcessMemory
ReleaseMutex
RemoveDirectoryA
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFileTime
SetHandleCount
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
UnmapViewOfFile
VirtualAlloc
WriteFile
WritePrivateProfileStringA
lstrcmpiA
user32
CallNextHookEx
CharUpperA
CheckDlgButton
ClientToScreen
CreateWindowExA
DispatchMessageA
DrawFocusRect
FindWindowA
GetClassNameA
GetDlgItemTextA
GetForegroundWindow
GetMenuItemCount
GetMessagePos
GetSystemMenu
GetWindow
IntersectRect
InvalidateRect
IsChild
LoadBitmapA
LoadCursorA
MessageBoxA
SetDlgItemTextA
SetForegroundWindow
SetWindowPos
SetWindowTextA
SystemParametersInfoA
TrackPopupMenu
UnregisterClassA
UpdateWindow
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 22KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 229KB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ