Static task
static1
Behavioral task
behavioral1
Sample
fe01879c2b484ac8031a33184b0d277b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fe01879c2b484ac8031a33184b0d277b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fe01879c2b484ac8031a33184b0d277b_JaffaCakes118
-
Size
2.7MB
-
MD5
fe01879c2b484ac8031a33184b0d277b
-
SHA1
b26a7e9f0a36b1889d8f942b66c253c24770618b
-
SHA256
aec1df83242318e6254844aa1f4ae760d2542597df65090447bd55751238a423
-
SHA512
44cd9367f49cbaa4ab88cb5831bf2cbe06632b255a2aafb6535dab799e08bd80bf87fb8eef6ef45b73392433fa804985b1b2f22e3a2d36178354b4ae652eecf6
-
SSDEEP
49152:yBFXsVuS++m4lmJSYSSzxNps7y+cnSNvKmmvpOHqZ9+Fe1NmA:UFXsV7++mGH4zxNpfSNSXwKfdLT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fe01879c2b484ac8031a33184b0d277b_JaffaCakes118
Files
-
fe01879c2b484ac8031a33184b0d277b_JaffaCakes118.exe windows:4 windows x86 arch:x86
617e8d01fb827284c21207aa0160c3dc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
CloseServiceHandle
ControlService
GetTokenInformation
OpenServiceA
RegCloseKey
RegEnumValueA
RegSetValueExA
RegisterServiceCtrlHandlerA
SetSecurityDescriptorDacl
kernel32
CreateEventA
CreateFileA
CreateFileMappingA
CreateMutexA
DisableThreadLibraryCalls
DuplicateHandle
ExitProcess
FindNextFileA
FindResourceA
FreeLibrary
GetCPInfo
GetCommandLineA
GetConsoleCP
GetCurrentDirectoryA
GetCurrentThreadId
GetDateFormatA
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFileTime
GetModuleHandleA
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetSystemTimeAsFileTime
GetTempPathA
GetThreadLocale
GetTickCount
GetTimeZoneInformation
GetVersionExA
GetWindowsDirectoryA
GlobalUnlock
HeapDestroy
HeapFree
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
LoadLibraryA
LocalAlloc
LocalFree
LockResource
Module32Next
MoveFileA
MoveFileExA
MulDiv
MultiByteToWideChar
OpenEventA
OpenProcess
RaiseException
ReadFile
ReleaseMutex
ResetEvent
ResumeThread
SearchPathA
SetEnvironmentVariableA
SetFilePointer
SetHandleCount
SetLastError
SetStdHandle
SetThreadPriority
SuspendThread
TerminateProcess
TlsAlloc
TlsSetValue
UnmapViewOfFile
VirtualFree
VirtualProtect
WaitForSingleObject
WritePrivateProfileStringA
ole32
CoGetClassObject
CoRegisterClassObject
CoTaskMemAlloc
OleLoadFromStream
user32
CallNextHookEx
CharLowerA
CharPrevA
CreateWindowExA
EnableMenuItem
EqualRect
FillRect
GetClassNameA
GetDesktopWindow
GetForegroundWindow
GetMenuItemCount
GetMessagePos
GetParent
GetSubMenu
GetSysColor
GetWindow
GetWindowPlacement
IsWindowVisible
LoadStringA
MessageBoxA
RegisterWindowMessageA
ReleaseCapture
SetDlgItemInt
SetFocus
SetRect
SetWindowRgn
UnhookWindowsHookEx
UnregisterClassA
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 56KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.adata Size: 2.1MB - Virtual size: 6.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 549KB - Virtual size: 552KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ