Static task
static1
Behavioral task
behavioral1
Sample
e1155c506e5ca904816980509559c5e0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1155c506e5ca904816980509559c5e0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1155c506e5ca904816980509559c5e0_JaffaCakes118
-
Size
35KB
-
MD5
e1155c506e5ca904816980509559c5e0
-
SHA1
968013eeace0dd9af235612281f381183b17293a
-
SHA256
10d041627e7354776495c105df880daec8e0950d7b016fe100bc4cf68d396ef2
-
SHA512
7b6b9dd458c434920b9d9a6d1694c7bff707ad40cad6237158ecbd67a577efd46c3ac80120ac60bcf9213d63b6a17dde27d0fdeb62b1ba37ea7bf866c196b409
-
SSDEEP
384:J68T6WRA23UioyWdtTrk9cgRNeh/NRYU2gSm+QtR3caZOpNeG4+9g+LELf+fmD:QoRxUtfkugRyYngHjMoG59gzSfs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1155c506e5ca904816980509559c5e0_JaffaCakes118
Files
-
e1155c506e5ca904816980509559c5e0_JaffaCakes118.exe windows:4 windows x86 arch:x86
28731d5658f5bbb4c0b537e596e63e2f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalLock
UnmapViewOfFile
MapViewOfFile
GetVersionExA
FreeLibrary
VirtualQuery
GetCurrentProcessId
GetProcAddress
LoadLibraryA
FileTimeToSystemTime
GetFileTime
CreateFileA
SetFileTime
SystemTimeToFileTime
VirtualFree
CreateFileMappingA
MultiByteToWideChar
GetFullPathNameA
ReadFile
VirtualAlloc
LocalUnlock
WinExec
WriteFile
GetTempFileNameA
GetTempPathA
SetFilePointer
GetDriveTypeA
CreateProcessA
GetStartupInfoA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetSystemTime
CreateThread
GetTickCount
CreateMutexA
ReleaseMutex
WaitForSingleObject
OpenMutexA
GetCommandLineA
GetLastError
TerminateProcess
GetModuleFileNameA
GetSystemDirectoryA
MoveFileA
CopyFileA
CreateToolhelp32Snapshot
Process32First
Process32Next
OpenProcess
GetModuleHandleA
LocalAlloc
LocalFree
GetCurrentProcess
CloseHandle
FindFirstFileA
Sleep
FindNextFileA
GetFileSize
FindClose
user32
wsprintfA
advapi32
DuplicateTokenEx
CreateProcessAsUserA
GetSecurityInfo
GetNamedSecurityInfoA
BuildExplicitAccessWithNameA
SetEntriesInAclA
SetNamedSecurityInfoA
AllocateAndInitializeSid
GetTokenInformation
GetLengthSid
InitializeAcl
AddAccessDeniedAce
SetSecurityInfo
FreeSid
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
LsaNtStatusToWinError
ImpersonateLoggedOnUser
ntdll
NtVdmControl
ZwTerminateThread
RtlInitUnicodeString
sprintf
memmove
ZwOpenSection
ZwClose
ZwQuerySystemInformation
wcscpy
mpr
WNetCloseEnum
WNetOpenEnumA
WNetEnumResourceA
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ