Static task
static1
Behavioral task
behavioral1
Sample
de527fe70e30596415c0dcaaf161ded2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de527fe70e30596415c0dcaaf161ded2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de527fe70e30596415c0dcaaf161ded2_JaffaCakes118
-
Size
1022KB
-
MD5
de527fe70e30596415c0dcaaf161ded2
-
SHA1
2bd59cec3a2d9cc8211000ada31c6026fd830cd7
-
SHA256
a789729c4ed9e493d45af2b94f9774aa7f96ce35a37e4bae9c14ce9799867f3e
-
SHA512
b3c7ed9b35dc8804f6c9f5cbbd26dfcc3ed242e28f9574988cb4b8c749f17a4a2f325bcdd489b4ae837a85eb704c45f2821e87d9418fb96bba5e44285048b35e
-
SSDEEP
24576:6BjG90oN2lj11mk/22yYzGrarZRm4X5Uh6rVh5LdfB2:AGtN2h1120R7m4XShYVxfB2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de527fe70e30596415c0dcaaf161ded2_JaffaCakes118
Files
-
de527fe70e30596415c0dcaaf161ded2_JaffaCakes118.exe windows:5 windows x86 arch:x86
512eb46a377179d07c005d1f17f8c636
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCloseKey
RegSetValueExW
RegQueryValueExW
OpenSCManagerW
CreateServiceW
RegOpenKeyExW
RegDeleteValueW
CloseServiceHandle
OpenServiceW
setupapi
SetupDiGetClassDevsW
SetupDiEnumDeviceInfo
SetupDiOpenClassRegKeyExW
SetupDiGetDeviceRegistryPropertyW
SetupDiSetDeviceRegistryPropertyW
SetupDiGetDeviceInstallParamsW
SetupDiSetClassInstallParamsW
SetupDiCallClassInstaller
SetupDiDestroyDeviceInfoList
user32
wsprintfW
LoadStringA
LoadStringW
MessageBoxW
MessageBoxA
kernel32
QueryPerformanceCounter
GetStartupInfoA
GetTickCount
GetCurrentThreadId
InterlockedCompareExchange
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
InterlockedExchange
ExitProcess
LocalFree
GetModuleHandleW
lstrcmpW
GetCommandLineW
lstrlenW
LocalAlloc
SetLastError
GetLastError
GetVersion
CloseHandle
DeviceIoControl
CreateFileW
DeleteFileW
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GetProcAddress
FreeLibrary
MoveFileExW
lstrcatW
lstrcpyW
GetSystemDirectoryW
LoadLibraryW
CreateDirectoryW
GetTempPathW
FormatMessageA
GetTempFileNameW
FormatMessageW
WriteFile
LockResource
SizeofResource
LoadResource
FindResourceA
FindResourceW
CreateFileA
DeleteFileA
lstrcpyA
GetCurrentProcess
CreateDirectoryA
ExpandEnvironmentStringsA
GetTempPathA
ExpandEnvironmentStringsW
lstrcatA
lstrlenA
GetTempFileNameA
IsDebuggerPresent
shell32
CommandLineToArgvW
SHGetFolderPathA
SHGetFolderPathW
msvcr90
_crt_debugger_hook
_controlfp_s
_invoke_watson
_except_handler4_common
_decode_pointer
_onexit
memcpy
memset
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ