Static task
static1
Behavioral task
behavioral1
Sample
c117485617c1e4c9ff401da33da8ee91_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c117485617c1e4c9ff401da33da8ee91_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c117485617c1e4c9ff401da33da8ee91_JaffaCakes118
-
Size
168KB
-
MD5
c117485617c1e4c9ff401da33da8ee91
-
SHA1
5f5f0534e616dd098b65dbc752b7b8313652d24a
-
SHA256
986ee4c92eb018aa48c1338219a1f5dfac0f42e5ac6b2412b8cfc6e0312e6f34
-
SHA512
af6c8bbb2550648e0054eab48a8174ea96985da0650e6fe4d35adee9f0f21962ee5ba92428af2a003e6c24670aa7b8930c620cda8f071dd057571696ea9fc6b8
-
SSDEEP
3072:2sHtLftjchT+IWEz47QXXIZd/SQN8uesLdI89ldWyBoVbcXL7ATC/jVPs/Huk3Ev:FHRfh+2EcPZd/BN1f+kdWyBo5UYTCrMZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c117485617c1e4c9ff401da33da8ee91_JaffaCakes118
Files
-
c117485617c1e4c9ff401da33da8ee91_JaffaCakes118.exe windows:4 windows x86 arch:x86
52d0f9c43e2c89fdace4e0e6903abc06
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ChangeServiceConfig2A
ControlService
DeleteService
GetTokenInformation
GetUserNameA
QueryServiceStatus
RegDeleteValueA
RegOpenKeyA
RegQueryValueA
RegQueryValueExA
SetServiceStatus
StartServiceA
kernel32
CompareStringA
CreateEventA
CreateFileA
DeleteCriticalSection
DeleteFileA
DeviceIoControl
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsA
FindFirstFileA
FormatMessageA
FreeLibrary
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetDateFormatA
GetExitCodeProcess
GetFileAttributesA
GetFileSize
GetFileTime
GetFileType
GetLastError
GetLocaleInfoA
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcAddress
GetProcessHeap
GetStringTypeA
GetSystemDirectoryA
GetSystemTimeAsFileTime
GetTickCount
GetVersion
GetWindowsDirectoryA
GlobalHandle
HeapDestroy
HeapSize
InterlockedCompareExchange
InterlockedExchange
IsBadWritePtr
IsDebuggerPresent
IsValidCodePage
IsValidLocale
LoadLibraryA
LoadLibraryExA
LoadResource
LocalAlloc
LocalFree
Module32Next
MoveFileA
MulDiv
OpenEventA
QueryPerformanceCounter
RaiseException
ReadProcessMemory
ResetEvent
ResumeThread
RtlUnwind
SetCurrentDirectoryA
SetEndOfFile
SetEvent
SetFileAttributesA
SetFilePointer
SetHandleCount
SetPriorityClass
Sleep
SystemTimeToFileTime
TerminateProcess
TlsAlloc
TlsFree
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
lstrcmpiA
lstrcpyA
lstrcpynA
lstrlenA
ole32
CoGetMalloc
CoMarshalInterThreadInterfaceInStream
CoRegisterClassObject
OleSaveToStream
user32
CallNextHookEx
CopyRect
CreateDialogParamA
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DialogBoxParamA
DrawIcon
EnableMenuItem
EndPaint
EnumChildWindows
EqualRect
ExitWindowsEx
GetClientRect
GetSubMenu
GetWindowPlacement
GetWindowTextLengthA
IsWindow
MessageBeep
MessageBoxA
PeekMessageA
PostQuitMessage
SetWindowPos
SetWindowRgn
SetWindowTextA
UnhookWindowsHookEx
UpdateWindow
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 129KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ