Static task
static1
Behavioral task
behavioral1
Sample
03423560c5d58d56aeddc4838b5b2fc4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03423560c5d58d56aeddc4838b5b2fc4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
03423560c5d58d56aeddc4838b5b2fc4_JaffaCakes118
-
Size
105KB
-
MD5
03423560c5d58d56aeddc4838b5b2fc4
-
SHA1
d3783b1f45e059e03c55cd37d058a5dc6d8d5379
-
SHA256
1a155d4599835d375b52b38349adb48277bd774e29702d5d73e48397c3c94d31
-
SHA512
ee54244d9184aca4d5d6a04b40159ae29bcbb03c318e716a6521ac752999ee1325afbf0b00c073ff922b9da0178d6c8b07416870c3e5c915a5a8b3104e35e096
-
SSDEEP
1536:5NrTZSSJw8oD5mmiKoBHgiLUffXWpkSv8652xDc7Q+BYrj86M:fTZhzoGlvLUnmn860c7LgA6M
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03423560c5d58d56aeddc4838b5b2fc4_JaffaCakes118
Files
-
03423560c5d58d56aeddc4838b5b2fc4_JaffaCakes118.exe windows:4 windows x86 arch:x86
2fcd15091d67bfd9c29a248c69305b05
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateToolhelp32Snapshot
EnterCriticalSection
FindClose
FreeLibrary
GetACP
GetCPInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatA
GetModuleFileNameA
GetPrivateProfileSectionNamesA
GetProcAddress
GetStartupInfoA
GetSystemInfo
GetTempFileNameA
GetTempPathA
GetTimeFormatA
GetVersion
GetWindowsDirectoryA
GlobalAlloc
HeapCreate
InitializeCriticalSection
InterlockedDecrement
InterlockedIncrement
IsValidCodePage
LoadLibraryA
LoadResource
Module32First
ReleaseMutex
RtlUnwind
SetCurrentDirectoryA
SetFileAttributesA
SetFilePointer
SuspendThread
TlsSetValue
VirtualAlloc
user32
CallWindowProcA
CharNextA
CharPrevA
CharUpperA
CreateDialogParamA
CreateWindowExA
DefWindowProcA
DestroyMenu
DestroyWindow
DrawIcon
EnableWindow
EndPaint
EnumChildWindows
GetClientRect
GetDC
GetMessageA
GetParent
GetWindowLongA
GetWindowTextLengthA
IsRectEmpty
LoadBitmapA
LoadCursorA
LoadImageA
MoveWindow
PeekMessageA
RegisterClipboardFormatA
SetDlgItemTextA
SetWindowRgn
SetWindowTextA
TrackPopupMenu
UnregisterClassA
UpdateWindow
wsprintfA
advapi32
AdjustTokenPrivileges
ChangeServiceConfig2A
ChangeServiceConfigA
CloseServiceHandle
ControlService
GetSecurityDescriptorControl
GetUserNameA
InitializeSecurityDescriptor
LockServiceDatabase
LookupAccountSidA
OpenProcessToken
OpenSCManagerA
QueryServiceStatus
RegCreateKeyExA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
RegFlushKey
RegOpenKeyA
RegOpenKeyExA
RegQueryValueA
RegQueryValueExA
RegSetValueExA
SetSecurityDescriptorDacl
SetServiceStatus
UnlockServiceDatabase
Sections
.text Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 864B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ