Static task
static1
Behavioral task
behavioral1
Sample
bd5219e59caecb81c8de58b5dc3d7516_JaffaCakes118.exe
Resource
win7-20240704-en
General
-
Target
bd5219e59caecb81c8de58b5dc3d7516_JaffaCakes118
-
Size
307KB
-
MD5
bd5219e59caecb81c8de58b5dc3d7516
-
SHA1
d643df84959a2374aae7db2b0a97f7bb2ba87bb9
-
SHA256
807a28f8c865a6d5f419e4a1793effacc12459d555e34b4f49e865eb6fc8d0a1
-
SHA512
c83d086507753a30782c9559033ad4543d546d2d5b80cf6855722939489830238edc0c05843784361f2dca0bf99b38fbf617a87cb5a7b387e0bf8028c9511660
-
SSDEEP
6144:ubrqTmyrytq40njYb9V2ry+Bg98HPEbDXmyOT0bbhaEWGzNCdEJNu9Gg:yuTmyetqfnjYbqrBq8HPWDTOWbtCdT5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd5219e59caecb81c8de58b5dc3d7516_JaffaCakes118
Files
-
bd5219e59caecb81c8de58b5dc3d7516_JaffaCakes118.exe windows:4 windows x86 arch:x86
a60925ab94e4e84fb9a2b6cfa2a8ad06
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetModuleFileNameW
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
RaiseException
GetCurrentThreadId
GetSystemDefaultLangID
FindResourceExW
LoadResource
LockResource
OutputDebugStringA
CloseHandle
Sleep
lstrcmpiW
SetUnhandledExceptionFilter
VirtualProtect
UnhandledExceptionFilter
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
LoadLibraryW
GetProcAddress
SetLastError
LocalAlloc
LocalFree
FreeLibrary
InitializeCriticalSection
GetCurrentProcess
GetLastError
lstrlenW
GetModuleHandleA
GetStartupInfoA
user32
GetNextDlgTabItem
LoadStringW
LoadAcceleratorsW
DestroyAcceleratorTable
DestroyWindow
UnhookWindowsHookEx
TranslateAcceleratorW
GetWindowPlacement
SetWindowPlacement
GetWindowRect
SetFocus
GetDlgItem
MessageBoxW
IsDialogMessageW
SetWindowsHookExW
CharNextW
UnregisterClassA
advapi32
RegSetValueExW
SetSecurityDescriptorDacl
EqualSid
InitializeAcl
GetSecurityDescriptorDacl
IsValidSecurityDescriptor
SetEntriesInAclW
BuildTrusteeWithSidW
GetExplicitEntriesFromAclW
MakeSelfRelativeSD
GetTrusteeNameW
LookupAccountSidW
GetSecurityDescriptorLength
BuildSecurityDescriptorW
BuildExplicitAccessWithNameW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
GetSecurityDescriptorSacl
GetSecurityDescriptorOwner
OpenProcessToken
GetTokenInformation
IsValidSid
GetSidSubAuthorityCount
GetSidSubAuthority
RegQueryInfoKeyW
RegDeleteValueW
InitializeSecurityDescriptor
gdi32
DeleteObject
ole32
CoTaskMemAlloc
StringFromGUID2
CoTaskMemRealloc
CoCreateInstance
CoTaskMemFree
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
time
rand
srand
_except_handler3
free
memset
wcschr
_XcptFilter
_callnewh
_CxxThrowException
realloc
_errno
__dllonexit
_lock
_onexit
memcpy
malloc
_exit
msvcp60
??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV01@H@Z
?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A
?cin@std@@3V?$basic_istream@DU?$char_traits@D@std@@@1@A
??5?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV01@AAH@Z
??6std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@0@AAV10@PBD@Z
?endl@std@@YAAAV?$basic_ostream@DU?$char_traits@D@std@@@1@AAV21@@Z
??1_Winit@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0Init@ios_base@std@@QAE@XZ
Sections
.text Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 275KB - Virtual size: 548KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ