Static task
static1
Behavioral task
behavioral1
Sample
024a48e799cfba63e0c5b96790003257_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
024a48e799cfba63e0c5b96790003257_JaffaCakes118
-
Size
2.0MB
-
MD5
024a48e799cfba63e0c5b96790003257
-
SHA1
d9e325c36002fe56327b9f62641c24042005d85e
-
SHA256
fe43162a97833be755e0043b0e0baf13995071282e8b9877fcf69d20b8874ffe
-
SHA512
abcf34b7fa46b5319b54d3251fdb63f4da578de7dfd4acffb43f6a03af595ba6cdd3c5aa1cf990b8d656a9d10283bc99191d633f6788ccc4bb4cdde02a084ccb
-
SSDEEP
24576:rLaCB+aYIE1Icl0f3/iBJXP4qkaQ0cJ8AjGwXBOpZb7i5iRQlo6qjM9qPplCNGvO:fek3/iBJXPyZqK0eQRQKo99N/lf1vh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 024a48e799cfba63e0c5b96790003257_JaffaCakes118
Files
-
024a48e799cfba63e0c5b96790003257_JaffaCakes118.exe windows:4 windows x86 arch:x86
f31149838623123ff28b20b7e8d38e68
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
ChangeServiceConfigA
CloseServiceHandle
ControlService
InitializeSecurityDescriptor
LookupPrivilegeValueA
OpenProcessToken
OpenSCManagerA
OpenServiceA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
SetEntriesInAclA
SetSecurityDescriptorDacl
SetSecurityInfo
SetServiceObjectSecurity
kernel32
AddAtomA
CloseHandle
CreateSemaphoreA
CreateToolhelp32Snapshot
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindAtomA
FreeLibrary
GetAtomNameA
GetCommandLineA
GetCurrentProcess
GetEnvironmentVariableA
GetFileAttributesA
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetTempPathA
GetWindowsDirectoryA
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsDBCSLeadByteEx
LeaveCriticalSection
LoadLibraryA
LocalAlloc
LocalFree
MoveFileExA
MultiByteToWideChar
OpenProcess
Process32First
Process32Next
ReleaseSemaphore
SetErrorMode
SetLastError
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
msvcrt
_fdopen
_read
_strdup
_strlwr
_write
__getmainargs
__lc_codepage
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_assert
_cexit
_ctype
_errno
_filelengthi64
_fstati64
_iob
_lseeki64
_onexit
_setmode
abort
atexit
atoi
fclose
fflush
fgetpos
fopen
fputc
fread
free
fsetpos
fwrite
getc
getenv
isalnum
localeconv
malloc
memchr
memcpy
memmove
memset
putc
realloc
setlocale
setvbuf
signal
strcmp
strcoll
strcpy
strftime
strlen
strstr
strtod
strtok
strxfrm
time
ungetc
wcslen
user32
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
GetMessageA
KillTimer
LoadCursorA
PostQuitMessage
RegisterClassExA
SetTimer
ShowWindow
TranslateMessage
UpdateWindow
wsprintfA
wininet
DeleteUrlCacheEntry
FindFirstUrlCacheEntryA
FindNextUrlCacheEntryA
Sections
.text Size: 284KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE