Static task
static1
Behavioral task
behavioral1
Sample
e1dc4593ba80391268d02f61322200e0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e1dc4593ba80391268d02f61322200e0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1dc4593ba80391268d02f61322200e0_JaffaCakes118
-
Size
83KB
-
MD5
e1dc4593ba80391268d02f61322200e0
-
SHA1
ab3ae1df6523120f0df019e8ac40453bb466794a
-
SHA256
099dbf89358b6f62bf07321a49f4b79230c4da16eaf74f45a0e6d4dce4698622
-
SHA512
155405a416a50ced70eab75553e8b07fde6328bf586dba067dad8222603c852c2a63e5937df7dece1fd036c825ed84b9cbee994045b41478b4c00ae3fae80166
-
SSDEEP
1536:7B6DET/XWrOJ8oz4FugFq6cCP7YbDMlHS+6O+uiyzzpgHXKE3:72ETW6xz4FG6JP7YbDMlHHdgKE3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1dc4593ba80391268d02f61322200e0_JaffaCakes118
Files
-
e1dc4593ba80391268d02f61322200e0_JaffaCakes118.exe windows:5 windows x86 arch:x86
e19ec8d3a85cca58c4880f61799357ae
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
query
CITextToSelectTreeEx
?SkipBlob@CMemDeSerStream@@UAEXK@Z
?PutWString@CDbCmdTreeNode@@SGXAAVPSerStream@@PBG@Z
??1CPidLookupTable@@QAE@XZ
?GetNumber@CQueryScanner@@QAEHAAKAAH@Z
??1CParseCommandTree@@QAE@XZ
?AddEntry@CCombinedPropertyList@@UAEXPAVCPropEntry@@H@Z
??1?$XPtr@VCDbCmdTreeNode@@@@QAE@XZ
?SetProperty@CDbColId@@QAEHPBG@Z
?FillMax@CKeyArray@@QAEHH@Z
?Release@CImpersonateRemoteAccess@@QAEXXZ
?StartCI@CMachineAdmin@@QAEHXZ
?IsCIStarted@CMachineAdmin@@QAEHXZ
??1CMmStream@@UAE@XZ
??1?$XPtr@VCDbProjectListAnchor@@@@QAE@XZ
?UpdateDiskLowInfo@CDiskFreeStatus@@QAEXXZ
ntdll
NtFlushInstructionCache
LdrProcessRelocationBlock
NtAssignProcessToJobObject
NtSetInformationObject
RtlStringFromGUID
ZwSuspendProcess
ZwQuerySymbolicLinkObject
ZwFlushVirtualMemory
NtSetHighWaitLowEventPair
NtCreateEvent
CsrAllocateMessagePointer
RtlAddRefActivationContext
msvcp60
??_F?$num_get@DV?$istreambuf_iterator@DU?$char_traits@D@std@@@std@@@std@@QAEXXZ
?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADH@Z
??4?$basic_stringstream@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@ABV01@@Z
??1?$num_get@GV?$istreambuf_iterator@GU?$char_traits@G@std@@@std@@@std@@UAE@XZ
??_F?$moneypunct@G$00@std@@QAEXXZ
?_Mode@?$basic_stringbuf@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEHH@Z
?pbase@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IBEPADXZ
?signaling_NaN@?$numeric_limits@F@std@@SAFXZ
??Xstd@@YAAAV?$complex@O@0@AAV10@ABV10@@Z
??0range_error@std@@QAE@ABV01@@Z
??_7?$moneypunct@D$0A@@std@@6B@
_Cosh
??_8?$basic_ifstream@DU?$char_traits@D@std@@@std@@7B@
kernel32
SetConsoleHardwareState
GetPrivateProfileSectionW
VirtualAlloc
AddVectoredExceptionHandler
LoadLibraryA
GetLocalTime
MapUserPhysicalPagesScatter
GetCurrentDirectoryW
SetFirmwareEnvironmentVariableA
LoadLibraryExW
GetTimeZoneInformation
FindNextVolumeW
GetThreadLocale
CreateWaitableTimerW
WTSGetActiveConsoleSessionId
LoadLibraryExA
SetConsoleKeyShortcuts
GlobalAlloc
advapi32
CreateRestrictedToken
RegisterTraceGuidsW
CopySid
RegSaveKeyA
CreatePrivateObjectSecurityWithMultipleInheritance
AddUsersToEncryptedFile
GetTrusteeFormW
ChangeServiceConfigW
WmiQueryAllDataA
CredFree
BuildImpersonateExplicitAccessWithNameW
SaferComputeTokenFromLevel
ElfOpenEventLogW
Sections
.text Size: 34KB - Virtual size: 33KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 26KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 300B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ