Static task
static1
Behavioral task
behavioral1
Sample
0062da7da72b0d85947df592fc71d681_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0062da7da72b0d85947df592fc71d681_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0062da7da72b0d85947df592fc71d681_JaffaCakes118
-
Size
2.8MB
-
MD5
0062da7da72b0d85947df592fc71d681
-
SHA1
9e1849c1bcb864856a1b00491c1e50a31a7936a5
-
SHA256
6ac2be88d8e78c608891756866749488ad83e4aa0a3670089279801c1c29949b
-
SHA512
d925b3dbde79f3ee15c348cf260887440dc710fb97d6a82f8ea7a3d97b9229d22bdb9f32fb135fad60d10921fcca5160db1e66b710c6ce5fcda009c4a88143a4
-
SSDEEP
49152:g0XCoa7FbbuCqYhHS2i5QC7zBIoMSyeP62pogUh7Di44KC3So:xCoaRbvqOXiW67xRQvvo
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0062da7da72b0d85947df592fc71d681_JaffaCakes118
Files
-
0062da7da72b0d85947df592fc71d681_JaffaCakes118.exe windows:4 windows x86 arch:x86
2627a144954d261d757f031f285f7c9c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegDeleteValueA
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCloseKey
FreeSid
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyA
RegQueryInfoKeyA
kernel32
lstrcatA
GetFileAttributesA
lstrlenA
lstrcmpiA
GetCurrentProcess
GetPrivateProfileStringA
GetPrivateProfileIntA
lstrcpyA
GetModuleFileNameA
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
SetFileAttributesA
lstrcmpA
FindFirstFileA
_lclose
_llseek
_lopen
GetWindowsDirectoryA
CreateDirectoryA
InterlockedDecrement
LocalAlloc
GetLastError
InterlockedIncrement
SetCurrentDirectoryA
CreateEventA
ResetEvent
CreateThread
GetVersionExA
FormatMessageA
FreeLibrary
GetProcAddress
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
LoadLibraryA
FreeResource
LockResource
LoadResource
FindResourceA
SizeofResource
CreateFileA
ReadFile
WriteFile
SetFilePointer
SetFileTime
SetEvent
TerminateThread
GlobalAlloc
GlobalFree
GetTempFileNameA
GetDriveTypeA
GetTempPathA
lstrcpynA
CloseHandle
GetDiskFreeSpaceA
GetCurrentDirectoryA
LoadLibraryExA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
LocalFree
TerminateProcess
RtlUnwind
UnhandledExceptionFilter
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetFileType
GetStdHandle
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
HeapCreate
GetStringTypeA
GetStringTypeW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
LCMapStringA
LCMapStringW
HeapFree
HeapAlloc
SetStdHandle
GetLocaleInfoA
GetLocaleInfoW
FlushFileBuffers
GetVolumeInformationA
LocalFileTimeToFileTime
DosDateTimeToFileTime
ExitProcess
gdi32
GetDeviceCaps
user32
EnableWindow
LoadStringA
GetDesktopWindow
wsprintfA
ExitWindowsEx
CharPrevA
DialogBoxParamA
SetWindowLongA
GetWindowLongA
CallWindowProcA
GetDlgItem
SetForegroundWindow
SetWindowTextA
SendDlgItemMessageA
GetDlgItemTextA
SetDlgItemTextA
SendMessageA
PeekMessageA
DispatchMessageA
MsgWaitForMultipleObjects
SetWindowPos
ReleaseDC
GetDC
GetWindowRect
MessageBoxA
ShowWindow
CharNextA
MessageBeep
EndDialog
comctl32
ord17
Sections
.text Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SharedD Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ