Static task
static1
Behavioral task
behavioral1
Sample
d0167ae814aeddde237f6a378039b5bd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d0167ae814aeddde237f6a378039b5bd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d0167ae814aeddde237f6a378039b5bd_JaffaCakes118
-
Size
440KB
-
MD5
d0167ae814aeddde237f6a378039b5bd
-
SHA1
1c65e604f5211d79022b761805a6bd7a6e81b129
-
SHA256
78c0bbd4ec9ede147e9a924040d0d99bd540bc14cdc0d5542dd5b61ca1bbdf24
-
SHA512
63701641ced872c3d1a2d0eb23c4bb107eaa66ca04b4d366b1b5b169993feb4beff3d7dcad7eec58247695fa9af4f006a0cf13a4025c86b6753ed8d918b2620e
-
SSDEEP
12288:orMCB/1pOglO6X2+cvojf/1rM6vPZ8h8c5:owI/nl/G+c21rM6vR8V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d0167ae814aeddde237f6a378039b5bd_JaffaCakes118
Files
-
d0167ae814aeddde237f6a378039b5bd_JaffaCakes118.exe windows:5 windows x86 arch:x86
0c19a81b3347c94866206b2aa57f0842
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcslen
__CxxFrameHandler
free
malloc
wcscpy
_wcsicmp
_purecall
__RTDynamicCast
wcscmp
swscanf
wcschr
wcsrchr
wcsstr
_wcsnicmp
_initterm
_adjust_fdiv
??1type_info@@UAE@XZ
?terminate@@YAXXZ
__dllonexit
_onexit
_except_handler3
msvcp60
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
atl
ord15
ord22
ord18
ord21
ord16
ord32
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
FreeSid
LookupAccountSidW
RegDeleteValueW
RegOpenKeyW
RegEnumKeyW
RegEnumKeyExW
RegDeleteKeyW
LookupAccountNameW
mpr
WNetGetUniversalNameW
ole32
CoInitialize
StringFromGUID2
CoGetMalloc
StringFromCLSID
CoTaskMemFree
CoCreateInstance
CoTaskMemAlloc
CreateStreamOnHGlobal
ReleaseStgMedium
oleaut32
SysAllocString
SysFreeString
VariantClear
VariantInit
shell32
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
shlwapi
PathCompactPathW
PathIsUNCW
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upack Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aspack Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.usaa Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uaan Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uaak Size: 406KB - Virtual size: 408KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uaaj Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.uaah Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ