Static task
static1
Behavioral task
behavioral1
Sample
df816ec776f245fe277b559f7fe34988_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df816ec776f245fe277b559f7fe34988_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df816ec776f245fe277b559f7fe34988_JaffaCakes118
-
Size
152KB
-
MD5
df816ec776f245fe277b559f7fe34988
-
SHA1
17519333cc4934bbc5694c7fec1be0e64ec66af1
-
SHA256
2f9765a14012919adf4d6c23642545f9bfa2250f944e06ce0a1127b87c6f39c8
-
SHA512
523abf0f69aee7180da3f91619373b0d05b53f4a098a30501c87941003125cb59bcf314fa08fedcd03e7c5b067afca19be31c66a5e25b7361719dd9af912495c
-
SSDEEP
1536:szMu1FuQdMpUBCwvnDraSACZhG6ZqHStSrbmxGpXjpvzBVaIbZXNJvfEUL6v3KL/:szn/mUhnDaH9fuGpT/7H7kZkxB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df816ec776f245fe277b559f7fe34988_JaffaCakes118
Files
-
df816ec776f245fe277b559f7fe34988_JaffaCakes118.exe windows:4 windows x86 arch:x86
c26345258b0ee34c43c839dc98cb116f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DuplicateHandle
GetCurrentProcess
OpenProcess
WriteFile
GetProcAddress
LoadLibraryA
SetFileTime
GetFileAttributesExA
FreeLibrary
TerminateProcess
WaitForSingleObject
CreateProcessA
GetVersionExA
GetModuleFileNameA
GetStartupInfoA
GetModuleHandleA
CloseHandle
GetLastError
Sleep
WinExec
GetSystemDirectoryA
CreateFileA
WideCharToMultiByte
user32
GetDesktopWindow
DispatchMessageA
TranslateMessage
GetMessageA
SendMessageTimeoutA
RegisterWindowMessageA
GetClassNameA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
DefWindowProcA
PostQuitMessage
ShowWindow
CreateWindowExA
RegisterClassExA
advapi32
OpenServiceA
CreateServiceA
ConvertSidToStringSidA
LookupAccountNameA
GetUserNameA
OpenSCManagerA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
StartServiceA
DeleteService
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
shlwapi
SHGetValueA
SHSetValueA
msvcrt
fopen
_stricmp
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
__CxxFrameHandler
strstr
strchr
atoi
wcslen
??2@YAPAXI@Z
??3@YAXPAX@Z
_access
_strlwr
srand
time
sprintf
rand
fclose
fflush
fwrite
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ