Static task
static1
Behavioral task
behavioral1
Sample
03193e4577aa53bebacd523b4e31168f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
03193e4577aa53bebacd523b4e31168f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
03193e4577aa53bebacd523b4e31168f_JaffaCakes118
-
Size
144KB
-
MD5
03193e4577aa53bebacd523b4e31168f
-
SHA1
f9e3f6145d44ada306bb1a1c2d25ecef86638326
-
SHA256
ab79371065e52b408840e8705dd17831fe2e7d861cfb5de3bc5d4f09dc474e64
-
SHA512
5a011c83d3fa70d69d4d36f6afd7f08e94042335c1a7f4909d77a357ce9f6a540c021082434a516c4a3aac73bb1417559d41403a55b5cbd9d8bbfacf373ae788
-
SSDEEP
1536:iuvXqUgzc4tnwibXJKBv9o4HybuOxCD2N85pezJ9qocTmv3d5zk:iaXjgGiVKBv9o4S6M7NxzJ9qocw3dm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03193e4577aa53bebacd523b4e31168f_JaffaCakes118
Files
-
03193e4577aa53bebacd523b4e31168f_JaffaCakes118.exe windows:4 windows x86 arch:x86
fd439b33c678ce2e2f611f76579e582d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
GlobalAlloc
MultiByteToWideChar
lstrlenW
WriteFile
lstrcatW
CreateFileA
GetTempFileNameA
GetTempPathA
lstrcmpW
ReadFile
GetLocalTime
SetFilePointer
GetCurrentProcess
GetModuleFileNameA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetWindowsDirectoryA
CreateDirectoryA
GetFileAttributesA
DeleteFileA
GetDriveTypeA
GlobalFree
CopyFileA
SetFileAttributesA
WritePrivateProfileStringA
GetFileSize
WaitForSingleObject
OpenMutexA
GetSystemDirectoryA
GetVersionExA
LocalAlloc
OutputDebugStringA
lstrcpynA
SetStdHandle
GetTimeZoneInformation
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetFileType
CreateProcessA
lstrcpyW
CreateMutexA
GetLastError
LoadLibraryA
FreeLibrary
ReleaseMutex
SetEnvironmentVariableA
CloseHandle
FlushFileBuffers
CompareStringA
CompareStringW
SetErrorMode
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
GetProcAddress
InterlockedExchange
RaiseException
HeapReAlloc
HeapAlloc
RtlUnwind
FindFirstFileA
FindNextFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
HeapFree
ExitProcess
TerminateProcess
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
VirtualFree
VirtualAlloc
IsBadWritePtr
GetEnvironmentVariableA
HeapDestroy
HeapCreate
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
LCMapStringA
LCMapStringW
HeapSize
GetStringTypeA
GetStringTypeW
UnhandledExceptionFilter
FreeEnvironmentStringsA
user32
ExitWindowsEx
CharNextA
MessageBoxA
LoadStringA
comdlg32
GetOpenFileNameA
advapi32
FreeSid
RegOpenKeyA
GetTokenInformation
AllocateAndInitializeSid
EqualSid
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteExA
Sections
.text Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE