Static task
static1
Behavioral task
behavioral1
Sample
ced3996bb2af8dad6ec67bf09c834d79_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
ced3996bb2af8dad6ec67bf09c834d79_JaffaCakes118
-
Size
168KB
-
MD5
ced3996bb2af8dad6ec67bf09c834d79
-
SHA1
f2a674af265b8cfabb489acb0ea3cf9aac316862
-
SHA256
1fdfaa765a65ec91cb19cbee172f2d8070acb6c49c26c693ee90ab484abf1443
-
SHA512
7bfb3de7be5048b7b5afa1ba63a2925e3105ed5162c8544a86d681c741bd3433daf009a3f30d7a9e236f187df0eb223f6e69d239d140a86a7354037a402006ed
-
SSDEEP
1536:vSXPcxyujg4MJplLrUHoaCo0C3MN1OmjGyRBMJJtZv:6cx64MvaBwrjGyMJJtZv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ced3996bb2af8dad6ec67bf09c834d79_JaffaCakes118
Files
-
ced3996bb2af8dad6ec67bf09c834d79_JaffaCakes118.exe windows:1 windows x86 arch:x86
c903e6205c0aab792a66b6baf1548080
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExW
OpenThreadToken
RegCreateKeyExA
RegQueryValueExA
FreeSid
RegQueryInfoKeyW
GetLengthSid
RegDeleteValueW
SetSecurityDescriptorDacl
RegDeleteKeyW
AllocateAndInitializeSid
AllocateAndInitializeSid
RegDeleteKeyW
AdjustTokenPrivileges
RegSetValueExA
RegCloseKey
RegSetValueExW
GetLengthSid
GetTokenInformation
OpenThreadToken
RegDeleteValueW
RegEnumValueW
RegEnumValueW
InitializeAcl
AllocateAndInitializeSid
RegDeleteValueW
RegOpenKeyExA
AdjustTokenPrivileges
AddAccessAllowedAce
InitializeSecurityDescriptor
AddAccessAllowedAce
RegEnumValueW
RegQueryValueExW
CloseServiceHandle
RegEnumKeyExW
RegQueryValueExW
CloseServiceHandle
RegOpenKeyW
RegSetValueExW
GetLengthSid
RegQueryInfoKeyW
RegCreateKeyExW
RegOpenKeyExW
RegCreateKeyExA
RegCreateKeyExA
RegQueryInfoKeyW
RegCreateKeyExW
RegOpenKeyExA
CloseServiceHandle
RegDeleteKeyW
GetTokenInformation
RegDeleteKeyW
RegQueryValueExA
RegCloseKey
RegQueryValueExA
RegCreateKeyExW
RegOpenKeyW
RegDeleteValueW
RegOpenKeyExW
AdjustTokenPrivileges
RegDeleteKeyW
RegCreateKeyExW
RegQueryValueExA
InitializeAcl
InitializeAcl
OpenProcessToken
RegOpenKeyExA
RegQueryValueExW
RegSetValueExA
RegCreateKeyExA
RegEnumKeyExW
OpenThreadToken
OpenThreadToken
CloseServiceHandle
user32
GetSystemMenu
WinHelpW
EnableWindow
SetWindowLongW
GetKeyState
DefWindowProcW
DispatchMessageW
WinHelpW
DestroyIcon
DestroyMenu
wsprintfA
FillRect
SetWindowTextW
GetDesktopWindow
MapWindowPoints
EndPaint
LoadStringA
CopyRect
GetWindow
IsWindowVisible
DestroyWindow
SetWindowTextW
LoadAcceleratorsW
GetCursorPos
PostMessageW
OffsetRect
CallWindowProcW
wsprintfW
MapWindowPoints
DestroyIcon
LoadStringW
CallWindowProcW
MessageBeep
SetWindowPos
GetCursorPos
IsDlgButtonChecked
LoadIconW
DispatchMessageA
kernel32
InterlockedDecrement
VirtualFree
InterlockedDecrement
GetModuleHandleA
lstrcpyW
GetVersionExA
GetModuleHandleA
GetStartupInfoW
WaitForSingleObject
LoadLibraryA
Sections
Size: 148KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�vmp0 Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
�reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
�reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE