Static task
static1
Behavioral task
behavioral1
Sample
b59199877e0d68a5e93fc8ea76374ed1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b59199877e0d68a5e93fc8ea76374ed1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b59199877e0d68a5e93fc8ea76374ed1_JaffaCakes118
-
Size
5KB
-
MD5
b59199877e0d68a5e93fc8ea76374ed1
-
SHA1
7803f160af428bcfb4b9ea2aba07886f232cde4e
-
SHA256
5b50e26a01b320f05d66727e9d220d5858cdac203ff62e4b9ced1cafc2683637
-
SHA512
9815ee218c7f737ef662f5fb44844ec17c6b9552e0432f2f8c60aded2fa19bb8157ec0839046ac387f604672137c417a98a8181440869316209a70a9d0e6a210
-
SSDEEP
96:8ufPG/bXeyV0UYDv92+uA8JvU3j4JOYtAUnIgQaDe:dfPG/lV0UYDvfuAovhauIgQaDe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b59199877e0d68a5e93fc8ea76374ed1_JaffaCakes118
Files
-
b59199877e0d68a5e93fc8ea76374ed1_JaffaCakes118.exe windows:5 windows x86 arch:x86
6917a0ad1f780cfb5562f698345f9b24
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateToolhelp32Snapshot
Process32NextW
WaitForSingleObject
Process32FirstW
SetLastError
GetLastError
SetThreadPriority
lstrcmpW
GetModuleFileNameW
Sleep
OpenProcess
GetCurrentThread
ExitProcess
lstrcpyA
HeapAlloc
GetProcessHeap
lstrlenA
GetCommandLineA
IsProcessorFeaturePresent
advapi32
OpenServiceW
RegCloseKey
RegisterServiceCtrlHandlerW
SetServiceStatus
ChangeServiceConfigW
DuplicateTokenEx
ChangeServiceConfig2W
RegOpenKeyW
CreateProcessAsUserW
RegQueryValueExW
StartServiceCtrlDispatcherW
OpenSCManagerW
OpenProcessToken
CloseServiceHandle
CreateServiceW
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 600B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE