Static task
static1
Behavioral task
behavioral1
Sample
f6a5da42ca898f20cb39d562f0614ada_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f6a5da42ca898f20cb39d562f0614ada_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f6a5da42ca898f20cb39d562f0614ada_JaffaCakes118
-
Size
24KB
-
MD5
f6a5da42ca898f20cb39d562f0614ada
-
SHA1
7a9ede3f93f10d13fbb0b2ddb18a4ac1c3cf3bdd
-
SHA256
7c7d91ada0783eefcbd555635ec7b98f1c7b81e45410b34b2531ff016e5d0775
-
SHA512
1fd7b18483fdf596f7c2010f6b485a0ac6017f528ead313423ac27e9a8091d551454b4a40353c691ac041366049bc1be79c3e60136c8b5c4d2b9b00c40ef9c9d
-
SSDEEP
384:Y5s2WajZPAF3ypTDU6cdIRuK+jyOB8nDOQwaVAw2YtqdUA+7O:OHWaVQ3ypTDVcdvK+eM8KwVsdEO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f6a5da42ca898f20cb39d562f0614ada_JaffaCakes118
Files
-
f6a5da42ca898f20cb39d562f0614ada_JaffaCakes118.exe windows:4 windows x86 arch:x86
8688dd222b161af0e9bfb08c7aec6806
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceA
WritePrivateProfileStringA
GetSystemTimeAsFileTime
LoadLibraryA
WriteConsoleW
QueryPerformanceCounter
InitializeCriticalSection
EnterCriticalSection
ExitProcess
CreateFileA
LeaveCriticalSection
TerminateProcess
VirtualAlloc
WriteProfileSectionW
WritePrivateProfileSectionA
DeleteCriticalSection
UnhandledExceptionFilter
FreeLibrary
WriteProfileStringA
GetCurrentProcessId
InterlockedDecrement
WideCharToMultiByte
GetLastError
GetCurrentProcess
LoadResource
GetCurrentThreadId
GetTickCount
SetUnhandledExceptionFilter
LockResource
GetProcAddress
Sleep
MultiByteToWideChar
LocalFree
SizeofResource
InterlockedIncrement
CloseHandle
ws2_32
socket
closesocket
WSAStartup
WSACleanup
setsockopt
listen
send
bind
accept
WSALookupServiceNextA
oleaut32
SysStringByteLen
SysAllocStringByteLen
SysAllocStringLen
GetActiveObject
SysFreeString
VariantCopyInd
VariantClear
SafeArrayCreate
VariantCopy
SysReAllocStringLen
user32
DestroyWindow
ShowWindow
GetParent
GetDC
LoadStringW
GetClientRect
GetSystemMetrics
wsprintfA
ArrangeIconicWindows
ReleaseDC
EnableWindow
AnimateWindow
MessageBoxA
TranslateMessage
GetDlgItem
GetWindowRect
BeginPaint
EndDialog
advapi32
RegQueryValueExW
RegDeleteKeyA
GetTokenInformation
RegDeleteKeyW
ObjectCloseAuditAlarmA
RegEnumKeyExW
AddAccessAllowedAce
InitializeSecurityDescriptor
RegCreateKeyExW
RegEnumValueW
RegCloseKey
RegQueryInfoKeyW
RegOpenKeyExW
FreeSid
OpenThreadToken
AccessCheckByTypeResultListAndAuditAlarmByHandleW
RegQueryValueExA
RegDeleteValueA
RegCreateKeyExA
AccessCheckByTypeAndAuditAlarmA
RegOpenKeyExA
RegSetValueExA
GetLengthSid
OpenProcessToken
AllocateAndInitializeSid
RegEnumKeyExA
CloseServiceHandle
RegSetValueExW
RegDeleteValueW
msvcrt
__doserrno
_chdir
_cabs
_access
_close
_c_exit
_cgetws
_beep
_atoldbl
__set_app_type
_atoi64
_chgsign
_assert
_cgets
__threadid
ole32
CoCreateObjectInContext
CoCreateInstance
CLSIDFromProgIDEx
CLSIDFromProgID
BindMoniker
CoCreateInstanceEx
CLIPFORMAT_UserSize
CLIPFORMAT_UserMarshal
PropVariantChangeType
CLIPFORMAT_UserFree
CLSIDFromOle1Class
CLIPFORMAT_UserUnmarshal
ws2help
WahCloseThread
WahCloseHandleHelper
WahCompleteRequest
WahCloseSocketHandle
WahCloseNotificationHandleHelper
comdlg32
PageSetupDlgA
GetSaveFileNameA
WantArrows
PrintDlgA
GetOpenFileNameA
LoadAlterBitmap
CommDlgExtendedError
dwLBSubclass
dwOKSubclass
ChooseColorA
GetFileTitleA
PrintDlgExA
ChooseFontA
FindTextA
ReplaceTextA
Sections
BSS Size: - Virtual size: 12KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
CODE Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 393B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ