Static task
static1
Behavioral task
behavioral1
Sample
de4af00e67d9af05ae7f3c080540654f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
de4af00e67d9af05ae7f3c080540654f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
de4af00e67d9af05ae7f3c080540654f_JaffaCakes118
-
Size
12KB
-
MD5
de4af00e67d9af05ae7f3c080540654f
-
SHA1
fbc4bf22ac83a13f5b29e4121dee3cecbbe0ce56
-
SHA256
952b39dee847203dc10d66ff5f39b1e16417165c571ec7e4902ac3c5b48cd707
-
SHA512
8c95e92d0b62c8eab3b56764546b54dac10181f622065b6d681a1368ef5f002da8ed9ec8d15c3f00c241b31f337e4719f717f91c46987012040b800e2da45bfe
-
SSDEEP
192:lKzY7b2L5QMw5x9ueQa4C4BiCWd51vo4AbvzJQhbjpBS1mbDAVlDR:4zY7JZQa4C4mvU2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource de4af00e67d9af05ae7f3c080540654f_JaffaCakes118
Files
-
de4af00e67d9af05ae7f3c080540654f_JaffaCakes118.exe windows:4 windows x86 arch:x86
554b2392059f90aaeda6b1eea410ae27
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryA
GetTempFileNameA
GetTempPathA
CloseHandle
GetFileSize
WriteFile
CreateFileA
DeleteFileA
FreeLibrary
GetLastError
lstrcatA
WaitForSingleObject
CreateThread
WinExec
CreateMutexA
GetVersionExA
lstrcmpiA
SetFileAttributesA
GetTickCount
ReadFile
SetFilePointer
CopyFileA
LoadLibraryA
GetProcAddress
GetCurrentProcess
Sleep
OutputDebugStringA
user32
ShowWindow
GetWindowLongA
FindWindowA
wsprintfA
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegSetValueExA
RegCreateKeyA
AdjustTokenPrivileges
wininet
DeleteUrlCacheEntry
msvcp60
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??Hstd@@YA?AV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBDABV10@@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??0?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAE@XZ
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
??0Init@ios_base@std@@QAE@XZ
??1Init@ios_base@std@@QAE@XZ
??0_Winit@std@@QAE@XZ
??1_Winit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?close@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?getline@std@@YAAAV?$basic_istream@DU?$char_traits@D@std@@@1@AAV21@AAV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@1@@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
shell32
ShellExecuteA
msvcrt
malloc
_onexit
__dllonexit
fopen
fwrite
fclose
fread
atoi
__CxxFrameHandler
time
localtime
strlen
memcpy
memset
_itoa
strchr
strcpy
sprintf
strcat
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE