Static task
static1
Behavioral task
behavioral1
Sample
00c9b0d087fc7b218be0841ba011cbf0_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
00c9b0d087fc7b218be0841ba011cbf0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
00c9b0d087fc7b218be0841ba011cbf0_JaffaCakes118
-
Size
158KB
-
MD5
00c9b0d087fc7b218be0841ba011cbf0
-
SHA1
55c42f5d3680d0ddeac71daba4559be9566b2c8d
-
SHA256
acd5b2e5d53e82721ec3acc6d4fc551709442fc07518e8c9225533d54df8f8e2
-
SHA512
3d16ac41d1b4d71858bdc311cc7133d16b45bdaa1627173fc8f10a551823ce37dd80a0ff0e1315b2e0e3243398559b28ad0f943539d7a65d62c57ef8f439ddd7
-
SSDEEP
3072:AvftX8oDe3D1qWpHT4YiTU79ERYjL+OHIXQDmLy0BwikQSpEz2:AvftXvqplZ7X+OogDmOmPF2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00c9b0d087fc7b218be0841ba011cbf0_JaffaCakes118
Files
-
00c9b0d087fc7b218be0841ba011cbf0_JaffaCakes118.exe windows:4 windows x86 arch:x86
ac223b9754070b2f16c917b8837e651e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AllocateAndInitializeSid
EqualSid
GetSecurityDescriptorControl
InitializeSecurityDescriptor
LookupAccountSidA
RegDeleteValueA
RegOpenKeyA
SetSecurityDescriptorDacl
kernel32
CopyFileA
CreateEventA
CreateFileA
CreateFileMappingA
CreateProcessA
CreateThread
CreateToolhelp32Snapshot
DeleteAtom
DeleteCriticalSection
DisableThreadLibraryCalls
DuplicateHandle
EnterCriticalSection
ExitProcess
ExitThread
FileTimeToLocalFileTime
FreeLibrary
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetEnvironmentStringsA
GetEnvironmentVariableA
GetFileSize
GetFileType
GetLastError
GetModuleHandleA
GetPrivateProfileStructA
GetProcAddress
GetProcessHeap
GetStdHandle
GetStringTypeA
GetSystemDirectoryA
GetSystemInfo
GetSystemTimeAsFileTime
GetThreadTimes
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalFree
GlobalReAlloc
GlobalUnlock
HeapCreate
HeapFree
InitializeCriticalSection
InterlockedCompareExchange
IsBadCodePtr
IsBadReadPtr
IsBadWritePtr
IsDebuggerPresent
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalFree
LockResource
Module32Next
MoveFileExA
MulDiv
OpenEventA
OutputDebugStringA
ReadFile
ReadProcessMemory
RtlUnwind
SetCurrentDirectoryA
SetEnvironmentVariableA
SetEvent
SetFileTime
SetPriorityClass
SetThreadPriority
SuspendThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualProtect
WriteFile
lstrcmpA
lstrcmpiA
lstrcpyA
lstrlenA
user32
CallWindowProcA
CharNextA
CharPrevA
CopyRect
CreateDialogParamA
CreatePopupMenu
CreateWindowExA
DefWindowProcA
DestroyWindow
DrawIcon
EnableMenuItem
FillRect
FindWindowA
GetDC
GetDlgCtrlID
GetKeyState
GetWindowLongA
InflateRect
IsWindow
LoadIconA
MessageBoxA
OffsetRect
RegisterClassExA
RegisterClipboardFormatA
SetCursor
SetFocus
UnhookWindowsHookEx
UnregisterClassA
wsprintfA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.INIT Size: 113KB - Virtual size: 252KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ