Static task
static1
Behavioral task
behavioral1
Sample
bd452349e117c25744f68f323b916112_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bd452349e117c25744f68f323b916112_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bd452349e117c25744f68f323b916112_JaffaCakes118
-
Size
12KB
-
MD5
bd452349e117c25744f68f323b916112
-
SHA1
590dadf61a9c018201d9d6100484a0a336e38b30
-
SHA256
165d28d7d8cd544dcfbfc0acdf3de8f301ebf504b6b5f67cb8337a934e5da6ec
-
SHA512
11bca681e0525bd87d10b9e6e3f679e3e138d8bfa4666f359a8756a2c2860915a0a07ce21feed199eec1281e3c582895bf6307b77784215921cfcbe7aee7a5c8
-
SSDEEP
192:PzY7b2L5QMw5x9ueQa4C4Brd51vo4AbvzJQhbjpBS1mbDAVlDR:PzY7JZQa4C4fvU2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd452349e117c25744f68f323b916112_JaffaCakes118
Files
-
bd452349e117c25744f68f323b916112_JaffaCakes118.exe windows:4 windows x86 arch:x86
554b2392059f90aaeda6b1eea410ae27
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
CloseHandle
GetFileSize
WriteFile
CreateFileA
DeleteFileA
FreeLibrary
GetLastError
lstrcatA
WaitForSingleObject
CreateThread
WinExec
CreateMutexA
GetVersionExA
lstrcmpiA
SetFileAttributesA
GetTickCount
ReadFile
SetFilePointer
CopyFileA
LoadLibraryA
GetProcAddress
GetCurrentProcess
Sleep
OutputDebugStringA
user32
ShowWindow
GetWindowLongA
FindWindowA
wsprintfA
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyA
AdjustTokenPrivileges
wininet
DeleteUrlCacheEntry
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
shell32
ShellExecuteA
msvcrt
malloc
_onexit
__dllonexit
fopen
fwrite
fclose
fread
atoi
__CxxFrameHandler
time
localtime
strlen
memcpy
memset
_itoa
strchr
strcpy
sprintf
strcat
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE