Static task
static1
Behavioral task
behavioral1
Sample
ce2016815bfd39ceaae24ea4b48c9553_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce2016815bfd39ceaae24ea4b48c9553_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce2016815bfd39ceaae24ea4b48c9553_JaffaCakes118
-
Size
155KB
-
MD5
ce2016815bfd39ceaae24ea4b48c9553
-
SHA1
3ce5dfff54b59c26aeff98b51c4fb0c4a0ec8f52
-
SHA256
c327d3ecd66eb80bc1db1ec6d38981c532c62917b36644d3d78a7c2c5bfeae21
-
SHA512
ff99cff0542dcc9b49b7c49dbf3aed4cf3962c2b1ab273c3ce136fd01f3e6d7532750c99bb38875c7a49792eedf244ee32248d13f0539b205f60ba9431f865d7
-
SSDEEP
3072:g5ua4aHGx7wynW+GqNM/lgWALKp1cogp5IEY8cXzyakLvhU:Eua4snKjGqS9c2pq3bKmaChU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce2016815bfd39ceaae24ea4b48c9553_JaffaCakes118
Files
-
ce2016815bfd39ceaae24ea4b48c9553_JaffaCakes118.exe windows:4 windows x86 arch:x86
2627a144954d261d757f031f285f7c9c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegDeleteValueA
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCloseKey
FreeSid
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyA
RegQueryInfoKeyA
kernel32
lstrcatA
GetFileAttributesA
lstrlenA
lstrcmpiA
GetCurrentProcess
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcpyA
GetModuleFileNameA
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
SetFileAttributesA
lstrcmpA
FindFirstFileA
_lclose
_llseek
_lopen
GetWindowsDirectoryA
CreateDirectoryA
InterlockedDecrement
LocalAlloc
GetLastError
InterlockedIncrement
SetCurrentDirectoryA
CreateEventA
ResetEvent
CreateThread
GetVersionExA
FormatMessageA
FreeLibrary
GetProcAddress
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
LoadLibraryA
FreeResource
LockResource
LoadResource
FindResourceA
SizeofResource
CreateFileA
ReadFile
WriteFile
SetFilePointer
SetFileTime
SetEvent
TerminateThread
GlobalAlloc
GlobalFree
GetTempFileNameA
GetDriveTypeA
GetTempPathA
lstrcpynA
CloseHandle
GetDiskFreeSpaceA
GetCurrentDirectoryA
LoadLibraryExA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
LocalFree
TerminateProcess
RtlUnwind
UnhandledExceptionFilter
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetFileType
GetStdHandle
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
HeapCreate
GetStringTypeA
GetStringTypeW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
LCMapStringA
LCMapStringW
HeapFree
HeapAlloc
SetStdHandle
GetLocaleInfoA
GetLocaleInfoW
FlushFileBuffers
GetVolumeInformationA
LocalFileTimeToFileTime
DosDateTimeToFileTime
ExitProcess
gdi32
GetDeviceCaps
user32
EnableWindow
LoadStringA
GetDesktopWindow
wsprintfA
ExitWindowsEx
CharPrevA
DialogBoxParamA
SetWindowLongA
GetWindowLongA
CallWindowProcA
GetDlgItem
SetForegroundWindow
SetWindowTextA
SendDlgItemMessageA
GetDlgItemTextA
SetDlgItemTextA
SendMessageA
PeekMessageA
DispatchMessageA
MsgWaitForMultipleObjects
SetWindowPos
ReleaseDC
GetDC
GetWindowRect
MessageBoxA
ShowWindow
CharNextA
MessageBeep
EndDialog
comctl32
ord17
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SharedD Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 73KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE