Static task
static1
Behavioral task
behavioral1
Sample
ec16850ff883bd0e1c6f5bcc479eab88_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ec16850ff883bd0e1c6f5bcc479eab88_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ec16850ff883bd0e1c6f5bcc479eab88_JaffaCakes118
-
Size
316KB
-
MD5
ec16850ff883bd0e1c6f5bcc479eab88
-
SHA1
8b325392ddf893b127ed3efe50622c5f64817c81
-
SHA256
c95b45fada3bec57cc9cbcc38c0ae95afe3a1b657b207b972d589d3c1f9102fc
-
SHA512
ecd01170c157cd64738e6b9a946f4ef769b4ea4b96ffc211e5eddb4e29b2ee39070933f8d76178dca93f70de1faa7f70e12eef6b222afc1a6a62703da3e5ca74
-
SSDEEP
6144:K1T7/luVDW/EnKSBu4/pYoNmyc3NuauTl+9Wu9syu03z:EXUVCE7/pra8VpuSez
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ec16850ff883bd0e1c6f5bcc479eab88_JaffaCakes118
Files
-
ec16850ff883bd0e1c6f5bcc479eab88_JaffaCakes118.exe windows:5 windows x86 arch:x86
61d979f34dedeccdef92488d560659f1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupAddInstallSectionToDiskSpaceListW
SetupSetDirectoryIdW
SetupInstallFilesFromInfSectionW
SetupInstallFromInfSectionW
SetupRemoveInstallSectionFromDiskSpaceListW
SetupFindNextLine
SetupGetLineTextW
SetupFindFirstLineW
SetupSetDirectoryIdExW
kernel32
InitializeCriticalSection
DeleteCriticalSection
GetLocalTime
MoveFileW
lstrcmpiW
GetLastError
GetCommandLineW
CloseHandle
CreateFileW
SetCurrentDirectoryW
Sleep
GetVersionExW
GetSystemDirectoryW
GetWindowsDirectoryW
GetComputerNameW
FreeLibrary
LoadLibraryExW
GetFileAttributesW
SetFileAttributesW
MoveFileExW
DeleteFileW
RemoveDirectoryW
FindClose
FindNextFileW
FindFirstFileW
GetSystemInfo
OutputDebugStringW
lstrcatW
LocalFree
FormatMessageW
LocalAlloc
CreateDirectoryW
GetCurrentDirectoryW
GlobalFree
GlobalAlloc
GetCurrentProcess
GetCurrentThread
MultiByteToWideChar
lstrcpyW
GetModuleHandleA
SetLastError
GetEnvironmentVariableW
lstrlenW
lstrcmpW
lstrcpynW
SetEnvironmentVariableW
GetProcAddress
LoadLibraryA
LocalReAlloc
WriteFile
WideCharToMultiByte
lstrlenA
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameW
ExpandEnvironmentStringsW
advapi32
GetTokenInformation
EqualSid
RegDeleteKeyW
RegEnumValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
EnumDependentServicesW
ChangeServiceConfig2W
CreateServiceW
DeleteService
StartServiceW
OpenSCManagerW
OpenServiceW
QueryServiceStatus
ControlService
ChangeServiceConfigW
CloseServiceHandle
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
MakeSelfRelativeSD
GetSecurityDescriptorLength
LookupAccountNameW
AllocateAndInitializeSid
SetEntriesInAclW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetFileSecurityW
FreeSid
RegOpenKeyW
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
OpenThreadToken
OpenProcessToken
user32
LoadStringW
MessageBoxW
wsprintfW
LoadBitmapW
clusapi
OpenCluster
ClusterOpenEnum
ClusterEnum
OpenClusterResource
OfflineClusterResource
CloseClusterResource
ClusterCloseEnum
CloseCluster
resutils
ResUtilResourceTypesEqual
ole32
StringFromGUID2
CoInitialize
CoCreateInstance
CoInitializeEx
CoGetClassObject
CoUninitialize
loadperf
LoadPerfCounterTextStringsW
UnloadPerfCounterTextStringsW
Sections
.text Size: 57KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 242KB - Virtual size: 398KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ