Static task
static1
Behavioral task
behavioral1
Sample
f013c345fcd1dc6adf0438e58b1a1982_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
f013c345fcd1dc6adf0438e58b1a1982_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f013c345fcd1dc6adf0438e58b1a1982_JaffaCakes118
-
Size
401KB
-
MD5
f013c345fcd1dc6adf0438e58b1a1982
-
SHA1
1cab258af89ec1ea00a623dd1f2a33542fef9e7f
-
SHA256
3a52c18db2accd7fd3c7fc77656bd78e6844aa82a7bc33f45b21ac57d1dc6a6d
-
SHA512
72491eef46b1b01f18f239f73e3ba6a54cc4edfbf38e95128097eb5a38dee0a6cfe99c89e4f46f512c80967d2031e4294c7b1e3ff695d4e54dd7490f0df81f7f
-
SSDEEP
6144:5/qeUEeG40zNONP0pqc6H13wT66vlmpD9Wyvy7dQL8vOxTi2quLby4iY4:Yej40EBp3sdWVSm1n4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f013c345fcd1dc6adf0438e58b1a1982_JaffaCakes118
Files
-
f013c345fcd1dc6adf0438e58b1a1982_JaffaCakes118.exe windows:4 windows x86 arch:x86
726cb7ffccfcd0b8ad984f41d192fcdd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
comctl32
InitCommonControls
kernel32
AllocConsole
AreFileApisANSI
CloseHandle
CreateDirectoryA
CreateFileA
CreateMutexA
CreateProcessA
CreateSemaphoreA
DeleteFileA
DuplicateHandle
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeEnvironmentStringsA
GetCommandLineA
GetCommandLineW
GetConsoleOutputCP
GetConsoleTitleA
GetCurrentProcess
GetCurrentProcessId
GetEnvironmentStrings
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetShortPathNameA
GetShortPathNameW
GetStartupInfoA
GetTempFileNameA
GetTempPathA
GetTickCount
GetUserDefaultLCID
GetVersionExA
GetWindowsDirectoryA
InitializeCriticalSection
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadResource
LockResource
MultiByteToWideChar
ReadFile
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryA
SearchPathA
SetConsoleTitleA
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcpynA
lstrlenA
msvcrt
_close
_fileno
_fstat
_isatty
_lseek
_open
_read
_stricmp
_wcslwr
_write
_HUGE
__getmainargs
__mb_cur_max
__p__environ
__set_app_type
_assert
_cexit
_errno
_fileno
_fmode
_fpreset
_iob
_isctype
_mkdir
_pctype
_putenv
_rmdir
_setmode
_strupr
_tempnam
abort
atexit
atoi
ctime
difftime
exit
fclose
fflush
fgets
fopen
fprintf
fread
free
fseek
fwprintf
fwrite
getc
getenv
malloc
memchr
memcpy
memmove
memset
mktime
printf
rand
remove
signal
sprintf
srand
strcat
strchr
strcmp
strcpy
strncmp
strncpy
strrchr
strstr
strtok
strtol
strtoul
swprintf
time
vfprintf
wcschr
wcscmp
wcscpy
wcslen
wcsncmp
wcsncpy
shell32
SHGetDesktopFolder
SHGetMalloc
SHGetPathFromIDListA
user32
DispatchMessageA
EnumWindows
ExitWindowsEx
FindWindowA
GetLastActivePopup
GetMessageA
GetWindowTextA
GetWindowThreadProcessId
IsIconic
IsWindowVisible
MessageBoxA
MessageBoxW
SetForegroundWindow
ShowWindow
TranslateMessage
Sections
.text Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 49KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 255KB - Virtual size: 256KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE