Static task
static1
Behavioral task
behavioral1
Sample
b88e47998ae0fe840e7817473708daa0_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b88e47998ae0fe840e7817473708daa0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b88e47998ae0fe840e7817473708daa0_JaffaCakes118
-
Size
2.6MB
-
MD5
b88e47998ae0fe840e7817473708daa0
-
SHA1
e61252816ac066dcc2a260c865195ff2015ce5fe
-
SHA256
1225e93e2416b0dad74118837da84288d016c120045bd5b9eb221fe726a0c0ac
-
SHA512
1284780e23b3a0bddaa46f2bd2c332325ea9dc36fb1f80be7df9afba60988f808a179a8c92ca5cc19ed3e758dea719e03c7d13dd1f5abf13bb834092979259e3
-
SSDEEP
49152:nKHFGwYjdl7n0d+Fi+gKXwmeT37x0XqITn+VBcdzoGkr:wcwql70zqSl06Ij
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b88e47998ae0fe840e7817473708daa0_JaffaCakes118
Files
-
b88e47998ae0fe840e7817473708daa0_JaffaCakes118.exe windows:4 windows x86 arch:x86
b08814d010d2f2fb5e690d0aa85ca7b8
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ChangeServiceConfig2A
CreateServiceA
DeleteService
LookupAccountSidA
OpenServiceA
RegFlushKey
kernel32
CloseHandle
CreateDirectoryA
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
CreateThread
CreateToolhelp32Snapshot
DeleteCriticalSection
DeleteFileA
ExitProcess
ExpandEnvironmentStringsA
FindFirstFileA
FindNextFileA
FindResourceA
FreeEnvironmentStringsA
FreeLibrary
GetConsoleCP
GetCurrentDirectoryA
GetCurrentProcessId
GetCurrentThread
GetDriveTypeA
GetEnvironmentStringsA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetLastError
GetLocalTime
GetModuleFileNameA
GetOEMCP
GetPrivateProfileSectionNamesA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStringTypeA
GetSystemDirectoryA
GetSystemInfo
GetThreadTimes
GetTickCount
GetTimeFormatA
GetUserDefaultLCID
GetVersionExA
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsDebuggerPresent
IsValidCodePage
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
Module32Next
MultiByteToWideChar
OpenEventA
OpenProcess
QueryPerformanceCounter
RaiseException
ReadFile
RemoveDirectoryA
ResumeThread
RtlUnwind
SetErrorMode
SetFileTime
SetThreadPriority
SizeofResource
Sleep
TlsAlloc
TlsFree
TlsGetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualProtect
VirtualQuery
WaitForSingleObject
WritePrivateProfileStringA
lstrcmpiA
lstrcpynA
lstrlenA
user32
CharPrevA
CharUpperA
CopyRect
DestroyMenu
DrawFocusRect
DrawTextA
EndPaint
GetClassNameA
GetClientRect
GetMessageA
GetProcessWindowStation
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
MoveWindow
MsgWaitForMultipleObjects
PostMessageA
RegisterClassExA
ReleaseCapture
ScreenToClient
SendMessageA
SetDlgItemInt
SetFocus
SetWindowTextA
SystemParametersInfoA
UnhookWindowsHookEx
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.INIT Size: 2.6MB - Virtual size: 7.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ