Static task
static1
Behavioral task
behavioral1
Sample
bddc0d13907d16301304ab73bb138b2e_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bddc0d13907d16301304ab73bb138b2e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bddc0d13907d16301304ab73bb138b2e_JaffaCakes118
-
Size
169KB
-
MD5
bddc0d13907d16301304ab73bb138b2e
-
SHA1
c789284479a5bf9b53e330999c822afad61017bd
-
SHA256
4fe4f3d9bcc76fa620f9df8a9e516c9dcf8f6bdcf581a34f15742d453bb4b14f
-
SHA512
46694e828d72d54bcb6be74d46b3ed8cb3173b3cde35276f7a7dbc64dda93fe4fa4f34e874fd344af28376474c0d2343768952445c1a846de0f8e4a5cd53a76b
-
SSDEEP
3072:Q/H7AQec9TBfSoTv4HJv36MofwEwrlTbg/G1ahhkoJ6XB3CHdZeHK:QzAQec9TBqmQ0MoITN1wF4S9ZeH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bddc0d13907d16301304ab73bb138b2e_JaffaCakes118
Files
-
bddc0d13907d16301304ab73bb138b2e_JaffaCakes118.exe windows:4 windows x86 arch:x86
3f2d5ac62d1de877274a07fd7dfdb732
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
LookupPrivilegeValueA
OpenServiceA
AdjustTokenPrivileges
ChangeServiceConfigA
CloseServiceHandle
OpenProcessToken
OpenSCManagerA
kernel32
GetSystemDirectoryA
lstrcmpiA
CloseHandle
CreateFileA
CreateToolhelp32Snapshot
ExitProcess
FindResourceA
GetCurrentProcess
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GlobalAlloc
GlobalFree
LoadLibraryA
LoadResource
LockResource
MoveFileExA
MultiByteToWideChar
OpenProcess
Process32First
Process32Next
RtlMoveMemory
RtlZeroMemory
SizeofResource
TerminateProcess
WriteFile
lstrcatA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 990B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 164KB - Virtual size: 163KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ