Static task
static1
Behavioral task
behavioral1
Sample
dd20d8e6daa4affd567bbd7ee927f289_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
dd20d8e6daa4affd567bbd7ee927f289_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dd20d8e6daa4affd567bbd7ee927f289_JaffaCakes118
-
Size
54KB
-
MD5
dd20d8e6daa4affd567bbd7ee927f289
-
SHA1
81f68aa2958d9da951a63d9f0c614deea89b218d
-
SHA256
d3f963d759b989915adf70e4ffc0fb1c07f45e7da92fb6b65130abf7206863a8
-
SHA512
fda9bc5bc3b1f22b3d94d448a440bbf6066d17e5a97811ce2c3342c12a4dc53e7127de74960de81026cdc338f982d7b6f316ef11c598f96a4da93d92b3883980
-
SSDEEP
1536:JWiXi2iS/A1YY6Sgi+heN13IVkiG9qvaCn3eEgHfF:JWiSVqBhK14VkQv5tgHfF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dd20d8e6daa4affd567bbd7ee927f289_JaffaCakes118
Files
-
dd20d8e6daa4affd567bbd7ee927f289_JaffaCakes118.exe windows:4 windows x86 arch:x86
2930719d2f0620f983e87fd7184cd575
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AdjustTokenPrivileges
AllocateAndInitializeSid
GetSecurityDescriptorControl
GetUserNameA
OpenSCManagerA
RegDeleteKeyA
RegEnumKeyExA
RegQueryInfoKeyA
SetSecurityDescriptorDacl
UnlockServiceDatabase
kernel32
CloseHandle
CopyFileA
CreateEventA
CreateFileA
DeleteAtom
DeleteCriticalSection
DisableThreadLibraryCalls
ExitProcess
ExitThread
FileTimeToLocalFileTime
FindClose
FindNextFileA
FreeEnvironmentStringsA
FreeLibrary
GetCommandLineA
GetConsoleMode
GetCurrentThreadId
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentVariableA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetProcessHeap
GetStdHandle
GetStringTypeA
GetSystemInfo
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
GetThreadTimes
GetTimeFormatA
GetTimeZoneInformation
GetVersionExA
GlobalAlloc
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapDestroy
HeapSize
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadWritePtr
IsDebuggerPresent
IsValidCodePage
IsValidLocale
LeaveCriticalSection
LoadResource
LocalFree
Module32Next
MoveFileExA
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
ReadFile
ReadProcessMemory
SearchPathA
SetEndOfFile
SetEnvironmentVariableA
SetFilePointer
SetFileTime
SetPriorityClass
SetStdHandle
SizeofResource
SuspendThread
TerminateProcess
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualFree
WriteFile
lstrcmpiA
lstrcpyA
user32
CharNextA
CheckMenuItem
CreateWindowExA
DialogBoxParamA
DispatchMessageA
FindWindowA
GetActiveWindow
GetClientRect
GetDlgItemTextA
GetFocus
GetWindowLongA
GetWindowTextA
GetWindowThreadProcessId
IntersectRect
IsWindow
MessageBoxA
MsgWaitForMultipleObjects
PeekMessageA
PostMessageA
RegisterClassA
RegisterClipboardFormatA
SendDlgItemMessageA
SetDlgItemTextA
SetForegroundWindow
SetWindowTextA
TranslateMessage
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 19KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 13KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ