Static task
static1
Behavioral task
behavioral1
Sample
d59f0a76a4b5615f1fea7d6c4c3b4851_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d59f0a76a4b5615f1fea7d6c4c3b4851_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d59f0a76a4b5615f1fea7d6c4c3b4851_JaffaCakes118
-
Size
360KB
-
MD5
d59f0a76a4b5615f1fea7d6c4c3b4851
-
SHA1
3ab25b2fe040c6ef4fffc65bdf51fa8df6d46144
-
SHA256
4c2051627a849fe09755805b863c274bafda32b237cf32f65d65f54956b7da08
-
SHA512
d7a66c7fa315268e969ba9d50a12b1c3b8ac3cc519b173f9c5b9ba790b6e980e760dcbea4bfd3c2fc833db3a68e528e271e2cefa6fafe024f439569bcc8d05d4
-
SSDEEP
6144:lZ7ifckWEN4+Ugh+VuC/QlROVbzTxdGXNzTXb36kBAaXP8:lhifHW8NUnVu0QlROdzTxdC1rVBAaE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d59f0a76a4b5615f1fea7d6c4c3b4851_JaffaCakes118
Files
-
d59f0a76a4b5615f1fea7d6c4c3b4851_JaffaCakes118.exe windows:4 windows x86 arch:x86
664126ea733005fe0bedfa2a7669029f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareStringW
CompareStringA
SetEndOfFile
ReadFile
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
GetStringTypeW
GetStringTypeA
SetFilePointer
WriteFile
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
CreateFileA
FreeEnvironmentStringsA
UnhandledExceptionFilter
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
VirtualAlloc
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetModuleFileNameA
GetVersion
GetStartupInfoA
GetModuleHandleA
GetSystemTime
GetEnvironmentVariableA
GetSystemDirectoryA
CopyFileA
SystemTimeToFileTime
FileTimeToSystemTime
SetLastError
GetVersionExA
lstrcmpiA
lstrlenA
LocalAlloc
CloseHandle
GetCommandLineA
CreateThread
GetLastError
FormatMessageA
LocalFree
GlobalAlloc
GlobalFree
GetLocalTime
LoadLibraryA
Sleep
GetProcAddress
FreeLibrary
SetSystemPowerState
GetCurrentProcess
CreateProcessA
GetTimeZoneInformation
HeapReAlloc
GetExitCodeProcess
FreeEnvironmentStringsW
HeapAlloc
TerminateProcess
ExitProcess
SetEnvironmentVariableA
user32
GetMessageA
ExitWindowsEx
SendMessageA
MessageBoxA
SetTimer
SetCursor
LoadCursorA
SetDlgItemTextA
CheckDlgButton
EndDialog
GetDlgItemTextA
EnableWindow
GetDlgItem
IsDlgButtonChecked
DialogBoxParamA
CheckRadioButton
LoadIconA
EnableMenuItem
ShowWindow
KillTimer
SetForegroundWindow
PostMessageA
TrackPopupMenu
GetSubMenu
GetCursorPos
PostQuitMessage
GetParent
SendDlgItemMessageA
DestroyMenu
LoadMenuA
wsprintfA
IsDialogMessageA
TranslateMessage
DispatchMessageA
CreateDialogParamA
SetWindowTextA
advapi32
SetServiceStatus
LookupPrivilegeValueA
ControlService
QueryServiceStatus
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
OpenServiceA
DeleteService
OpenSCManagerA
CreateServiceA
CloseServiceHandle
StartServiceA
RegDeleteKeyA
RegDeleteValueA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
InitiateSystemShutdownA
OpenProcessToken
AdjustTokenPrivileges
comdlg32
GetOpenFileNameA
comctl32
InitCommonControlsEx
shell32
Shell_NotifyIconA
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHBrowseForFolderA
winmm
PlaySoundA
mpr
WNetAddConnection2A
WNetCancelConnection2A
wsock32
WSACleanup
WSAGetLastError
recv
send
setsockopt
sendto
ntohl
inet_addr
ioctlsocket
gethostbyname
connect
shutdown
closesocket
accept
socket
htons
bind
listen
WSAAsyncSelect
WSAStartup
htonl
Sections
.idata Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 36KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 192KB - Virtual size: 308KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE