Static task
static1
Behavioral task
behavioral1
Sample
e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e31915acbb7c015d82dfaa72646f9815_JaffaCakes118
-
Size
368KB
-
MD5
e31915acbb7c015d82dfaa72646f9815
-
SHA1
7c29d83215851c4d8be83a15bfcac0747304d602
-
SHA256
69058d92f560ad03fbeff38d50ab8ffdcf39f3e7ddfca4bc5adb440b2b6de7c5
-
SHA512
76a86bc9f0d8086a56c768ade02a0b2aba468631d98d4adc53f578e364d06e1c48b7e3f6c309b1fa9be0090c1aec4042d66e134537c377bc39ec764bc2e428f5
-
SSDEEP
6144:DbXofeVfgK9bZrUmn3t49U9fW/g3C2qvSXt/XbYHJ6HfBnMwnctf12VSPkdJoLeC:DbX4eVT9bNUm3KaZTC5veg6/X/oSBq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e31915acbb7c015d82dfaa72646f9815_JaffaCakes118
Files
-
e31915acbb7c015d82dfaa72646f9815_JaffaCakes118.exe windows:4 windows x86 arch:x86
e12f7b497694788540342a51790cc900
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_heapset
_acmdln
__dllonexit
fwscanf
_onexit
abs
_outpd
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
memcpy
_controlfp
cosh
user32
DeferWindowPos
GetClipboardFormatNameW
GetDlgCtrlID
DefFrameProcW
ModifyMenuA
GetClassInfoW
ValidateRect
AdjustWindowRect
SetCaretPos
CharNextW
DestroyMenu
WindowFromPoint
CharPrevW
AttachThreadInput
DrawStateW
GetWindowTextA
IsDlgButtonChecked
WaitMessage
RegisterClipboardFormatA
GetMenu
CharUpperW
SetCursor
InsertMenuA
SetMenuDefaultItem
CheckMenuItem
SetWindowLongW
advapi32
GetSidLengthRequired
CreateServiceA
CreateProcessAsUserA
OpenServiceA
RegOpenKeyExA
RevertToSelf
GetLengthSid
LogonUserA
ControlService
EnumDependentServicesA
GetUserNameA
RegSetValueExA
GetSidSubAuthority
StartServiceCtrlDispatcherA
GetSidIdentifierAuthority
LookupPrivilegeValueW
ChangeServiceConfigW
RegisterServiceCtrlHandlerA
LockServiceDatabase
AllocateAndInitializeSid
RegOverridePredefKey
SetEntriesInAclW
RegCloseKey
RegQueryValueA
GetFileSecurityW
InitializeSecurityDescriptor
StartServiceCtrlDispatcherW
InitializeSid
CreateServiceW
OpenThreadToken
MakeAbsoluteSD
LookupAccountNameW
SetNamedSecurityInfoW
CreateProcessAsUserW
RegRestoreKeyW
CloseServiceHandle
RegNotifyChangeKeyValue
RegEnumKeyW
ReadEventLogW
QueryServiceConfigW
SetSecurityDescriptorGroup
RegCreateKeyW
SetSecurityDescriptorOwner
GetAclInformation
OpenSCManagerA
LsaFreeMemory
ReportEventW
LsaQueryInformationPolicy
GetServiceDisplayNameW
AdjustTokenPrivileges
OpenProcessToken
RegCreateKeyExA
LsaOpenPolicy
GetAce
RegQueryInfoKeyW
OpenSCManagerW
GetKernelObjectSecurity
SetSecurityDescriptorSacl
RegEnumKeyExA
GetUserNameW
RegOpenKeyExW
SetKernelObjectSecurity
EnumServicesStatusA
CopySid
gdi32
StrokePath
GetFontData
RealizePalette
EnumMetaFile
GetObjectA
SetBkColor
GetPixel
RestoreDC
ExtFloodFill
DPtoLP
EndPath
SetBkMode
EnumFontFamiliesExW
EqualRgn
RemoveFontResourceA
FillPath
GetTextExtentPoint32A
SetPolyFillMode
StartDocW
Pie
SetRectRgn
OffsetRgn
SaveDC
CreateRoundRectRgn
ScaleWindowExtEx
AbortDoc
CreateICW
UpdateColors
version
VerQueryValueW
VerQueryValueA
VerInstallFileA
VerInstallFileW
Sections
.text Size: 72KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 541KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 224KB - Virtual size: 222KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ