Static task
static1
Behavioral task
behavioral1
Sample
b73adee682983167871ee5d553a7493a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b73adee682983167871ee5d553a7493a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b73adee682983167871ee5d553a7493a_JaffaCakes118
-
Size
159KB
-
MD5
b73adee682983167871ee5d553a7493a
-
SHA1
febbe1299df20925583592cd45c03f36ad8e550f
-
SHA256
b07fff04a669fe53659507cd5b16009be900169f9984f84f1dbe026639faca39
-
SHA512
d17021590122452a8fa4ec79e36e531277019d1fbae7a5eaea1f49efbccc8964ce55778490072efee13826208cc25007b48af54b70749a43b04bdc17a61a5998
-
SSDEEP
3072:IaGwwHtH/lMkt4XMqdoaPYgcjVdpGIhFGgcmX6/jN2lfPEURQk/:I3zNukm8qdAgSsGay6/jglXEUp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b73adee682983167871ee5d553a7493a_JaffaCakes118
Files
-
b73adee682983167871ee5d553a7493a_JaffaCakes118.exe windows:4 windows x86 arch:x86
a0c7a34eeb96c60cd7a847811666313d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
LockServiceDatabase
OpenProcessToken
QueryServiceConfig2A
RegCreateKeyExA
RegDeleteValueA
RegEnumValueA
RegSetValueExA
kernel32
AddAtomA
CloseHandle
CopyFileA
CreateEventA
CreateMutexA
CreateThread
CreateToolhelp32Snapshot
DisableThreadLibraryCalls
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FindClose
FlushFileBuffers
FormatMessageA
FreeLibrary
GetConsoleMode
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStringsA
GetFileAttributesA
GetFileSize
GetFileType
GetFullPathNameA
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetOEMCP
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetStringTypeA
GetThreadLocale
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalFree
GlobalLock
GlobalUnlock
HeapCreate
HeapDestroy
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
Module32First
MoveFileA
MulDiv
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReadFile
ResetEvent
ResumeThread
RtlUnwind
SetEndOfFile
SetEnvironmentVariableA
SetErrorMode
SetFilePointer
SetFileTime
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SystemTimeToFileTime
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
WaitForSingleObject
WriteConsoleA
WriteFile
WritePrivateProfileStringA
lstrcatA
lstrcmpiA
user32
CallNextHookEx
CallWindowProcA
CharPrevA
CreateDialogParamA
CreateWindowExA
DialogBoxParamA
DispatchMessageA
EnumChildWindows
EqualRect
GetCursorPos
GetDlgItem
GetParent
InvalidateRect
LoadIconA
LoadImageA
LoadStringA
MessageBoxA
PeekMessageA
PostMessageA
RegisterWindowMessageA
ScreenToClient
SendDlgItemMessageA
SetCursor
SetFocus
SystemParametersInfoA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.INIT Size: 110KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ