Static task
static1
Behavioral task
behavioral1
Sample
fedb45816bc9f94ab08c54a4f1040894_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fedb45816bc9f94ab08c54a4f1040894_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fedb45816bc9f94ab08c54a4f1040894_JaffaCakes118
-
Size
71KB
-
MD5
fedb45816bc9f94ab08c54a4f1040894
-
SHA1
d1ebace50990e82960f89757e0992a263838a26a
-
SHA256
d08883c0cff3281308988516ee088e0f90db2b7fd07e9e76e688d1ba2d73d3a3
-
SHA512
2e2c71789319646873313dc1ff5195431ac98461e25f8fc1ca2567ff63a7afff4983637c22b520bf8c7af3a3c3cd02b7cbc25f413710d45a82ec5af55278e829
-
SSDEEP
1536:lITgO6FvTcYhfnPXkn2WP8jbJhRRdVlxvFJkuWt:lIloTffkn2WU/JHRdVHvFJkV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fedb45816bc9f94ab08c54a4f1040894_JaffaCakes118
Files
-
fedb45816bc9f94ab08c54a4f1040894_JaffaCakes118.exe windows:4 windows x86 arch:x86
24f377e2e38eefe2d499bb83051a7489
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
ControlService
GetUserNameA
LockServiceDatabase
QueryServiceConfig2A
RegCreateKeyExA
RegDeleteKeyA
RegQueryInfoKeyA
StartServiceA
kernel32
CompareStringA
ContinueDebugEvent
CreateFileMappingA
CreateProcessA
CreateToolhelp32Snapshot
DeleteCriticalSection
DisableThreadLibraryCalls
DuplicateHandle
ExitProcess
FileTimeToLocalFileTime
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FlushFileBuffers
FreeEnvironmentStringsA
GetCPInfo
GetCommandLineA
GetConsoleOutputCP
GetCurrentDirectoryA
GetCurrentProcess
GetDriveTypeA
GetEnvironmentStringsA
GetExitCodeProcess
GetFileAttributesA
GetFileType
GetFullPathNameA
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileSectionA
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetTempFileNameA
GetTimeFormatA
GlobalFree
GlobalHandle
GlobalLock
GlobalReAlloc
GlobalUnlock
HeapAlloc
HeapCreate
HeapFree
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
IsBadWritePtr
IsDebuggerPresent
IsValidCodePage
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LocalAlloc
MoveFileA
MoveFileExA
MultiByteToWideChar
OpenProcess
OutputDebugStringA
QueryPerformanceCounter
ReadFile
ReadProcessMemory
ResetEvent
SetCurrentDirectoryA
SetEnvironmentVariableA
SetErrorMode
SetFileTime
SetHandleCount
SetLastError
SetThreadPriority
SetUnhandledExceptionFilter
SystemTimeToFileTime
TerminateProcess
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
WritePrivateProfileStringA
lstrcatA
lstrcmpiA
lstrcpyA
user32
CreateWindowExA
DefWindowProcA
DestroyIcon
DispatchMessageA
DrawFocusRect
EnableMenuItem
GetActiveWindow
GetClassNameA
GetMenuItemCount
GetMessageA
GetParent
GetSubMenu
GetSysColorBrush
GetWindowLongA
KillTimer
LoadCursorA
LoadIconA
LoadStringA
MessageBoxA
MoveWindow
OffsetRect
SetCursor
SetMenu
ShowWindow
TrackPopupMenu
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 32KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 15KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
mijfj Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
utbmf Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ