Static task
static1
Behavioral task
behavioral1
Sample
d21626516e6346efcafd62f96e512f2b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d21626516e6346efcafd62f96e512f2b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d21626516e6346efcafd62f96e512f2b_JaffaCakes118
-
Size
11KB
-
MD5
d21626516e6346efcafd62f96e512f2b
-
SHA1
3f5421ff3d61fe7a59813acbcbca1af3a313bf52
-
SHA256
c458c87f4206f3fe3b58a3dd95e156ccdb95f0fd559ded6e8519e0fd9d07c502
-
SHA512
803d9ce521867de639e9017a73f9770853f0594dcc4932d062c2782833a2921e039f53f7ce9067d6c70843fc12b2f12220d2041b01b2bdf02f9f520291bd77ea
-
SSDEEP
192:zMAkXJEJsjreZw7zGqhbypL/z8KC142roxAWca1ReoAofMc5H261oy:IAkXKsHeGdy5/z8KbxAWca1Rdffd5W61
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d21626516e6346efcafd62f96e512f2b_JaffaCakes118
Files
-
d21626516e6346efcafd62f96e512f2b_JaffaCakes118.exe windows:4 windows x86 arch:x86
0486f71701bc5701fb923c34bd38cd60
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
ExitProcess
WinExec
CopyFileA
CreateThread
GetCurrentThreadId
CreateDirectoryA
HeapAlloc
SetUnhandledExceptionFilter
GetWindowsDirectoryA
ReleaseMutex
CreateMutexA
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
GetProcAddress
HeapFree
GetLastError
lstrcpyA
SetLastError
lstrcmpiA
GetTempPathA
GetTickCount
FindResourceA
LoadResource
GetSystemDirectoryA
lstrcatA
FindFirstFileA
LocalFileTimeToFileTime
SetFileTime
SizeofResource
WriteFile
FreeResource
MoveFileA
DeleteFileA
GetModuleFileNameA
CreateFileA
SetFilePointer
ReadFile
OutputDebugStringA
MultiByteToWideChar
WideCharToMultiByte
GetCurrentProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
lstrlenA
Sleep
GetFileAttributesA
user32
LoadCursorA
RegisterClassExA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
PostQuitMessage
wsprintfA
LoadIconA
CreateWindowExA
GetInputState
PostThreadMessageA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
GetUserNameA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
CreateServiceA
OpenSCManagerA
SetFileSecurityA
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
AddAccessAllowedAce
AddAce
EqualSid
GetAce
InitializeAcl
GetLengthSid
GetAclInformation
GetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetFileSecurityA
LookupAccountNameA
StartServiceA
OpenServiceA
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
CloseServiceHandle
msvcrt
_except_handler3
rand
strchr
strstr
realloc
malloc
??1type_info@@UAE@XZ
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__set_app_type
_controlfp
__p__fmode
??2@YAPAXI@Z
memset
strlen
??3@YAXPAX@Z
memcpy
__CxxFrameHandler
netapi32
NetApiBufferFree
NetUserGetLocalGroups
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ