Static task
static1
Behavioral task
behavioral1
Sample
eadf69b486764172e57930c8150231dd_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eadf69b486764172e57930c8150231dd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eadf69b486764172e57930c8150231dd_JaffaCakes118
-
Size
310KB
-
MD5
eadf69b486764172e57930c8150231dd
-
SHA1
3acecd03f93d598d628796e378a40d25bf44e754
-
SHA256
3cd84d9032c3ed14125a092eb59a2708eaec7e6eacaf94ae67b9e89e9060c640
-
SHA512
c1dd41ef19a95c65fa612d1aae810b7cd140dd84e833e360d27e946e4c0c48a9ca94edfc2183684dd62a092dc4da976657c017b778a9ebdf1e263900878d0eaa
-
SSDEEP
6144:6hvGwKtMyUuNmayzYV4UYV5xwG8Pxx/L1Lmpj3JpUTj5a1RPfKNE2:6h4IYWJVIG8Pvz4VAFafXKNE2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eadf69b486764172e57930c8150231dd_JaffaCakes118
Files
-
eadf69b486764172e57930c8150231dd_JaffaCakes118.exe windows:5 windows x86 arch:x86
0c00b9efc8d97874f74af1557fa56df1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
qsort
??3@YAXPAX@Z
realloc
??2@YAPAXI@Z
_wcsupr
towupper
isdigit
_callnewh
__CxxFrameHandler
free
_wcsicmp
_CxxThrowException
__RTDynamicCast
_purecall
wcslen
wcsspn
_except_handler3
_onexit
__dllonexit
??1type_info@@UAE@XZ
?terminate@@YAXXZ
_adjust_fdiv
_initterm
wcstoul
wcstombs
wcschr
??0exception@@QAE@ABQBD@Z
malloc
??0exception@@QAE@ABV0@@Z
bsearch
wcscpy
wcsrchr
wcscat
wcsncmp
msvcp60
?nothrow@std@@3Unothrow_t@1@B
??_7bad_alloc@std@@6B@
??1bad_alloc@std@@UAE@XZ
??0bad_alloc@std@@QAE@ABV01@@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
iassvcs
IASVariantChangeType
IASUninitialize
IASInitialize
advapi32
StartServiceW
CloseServiceHandle
RegConnectRegistryW
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
OpenServiceW
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteKeyW
OpenSCManagerW
ControlService
QueryServiceStatus
kernel32
lstrlenW
lstrcpyW
GetProcAddress
InterlockedIncrement
InterlockedDecrement
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
GetModuleHandleA
GetLastError
CloseHandle
HeapDestroy
DeleteCriticalSection
lstrcatW
GetModuleFileNameW
lstrcpynW
FreeLibrary
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
LocalFree
lstrcmpW
GetComputerNameW
GetComputerNameExW
InitializeCriticalSection
SleepEx
CreateThread
QueueUserAPC
GetVersionExW
DisableThreadLibraryCalls
SetLastError
FormatMessageA
Sleep
InterlockedExchange
VirtualQuery
SystemTimeToFileTime
lstrcmpiW
netapi32
NetWkstaGetInfo
DsRoleGetPrimaryDomainInformation
NetApiBufferFree
DsGetDcNameW
ole32
CLSIDFromProgID
CoSetProxyBlanket
OleRun
CLSIDFromString
CoTaskMemFree
CoTaskMemAlloc
CoTaskMemRealloc
CoCreateInstance
rtutils
TraceRegisterExW
TraceVprintfExA
TraceDeregisterW
user32
CharNextW
LoadStringW
wsprintfA
wsprintfW
Sections
.text Size: 39KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 256KB - Virtual size: 431KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ