Static task
static1
Behavioral task
behavioral1
Sample
07a7c24bd3a6c0660bfca34345a67500_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
07a7c24bd3a6c0660bfca34345a67500_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
07a7c24bd3a6c0660bfca34345a67500_JaffaCakes118
-
Size
57KB
-
MD5
07a7c24bd3a6c0660bfca34345a67500
-
SHA1
8c5387e4883777fa15f1b25e1c46c53e1cf0d1ad
-
SHA256
b5ee8380924f5ad31e8768582dfd19d6fc90779d2e6a5ce3c78ee00e543eda7b
-
SHA512
15639ed4fc3c2d479a42958cd82178666576a0e0108588f9554d6fea48baf7f68f1ee745dfa92c89c227489986eb84ba4825025f4e986e48c6c58645b2504dc1
-
SSDEEP
1536:nko72ySy6PDFmy72vNFwmmuJkeC4mkdxP4vCE:EMyuNFXmAkeC4mkfg6E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07a7c24bd3a6c0660bfca34345a67500_JaffaCakes118
Files
-
07a7c24bd3a6c0660bfca34345a67500_JaffaCakes118.exe windows:4 windows x86 arch:x86
fbd009f5b3a95d6ef2e10eeead9ddd3f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
AllocateAndInitializeSid
ChangeServiceConfigA
ControlService
EqualSid
FreeSid
RegCloseKey
RegEnumValueA
RegFlushKey
RegOpenKeyExA
RegisterServiceCtrlHandlerA
UnlockServiceDatabase
kernel32
CloseHandle
CompareStringA
CreateDirectoryA
CreateFileMappingA
CreateProcessA
DeleteCriticalSection
ExitProcess
ExitThread
ExpandEnvironmentStringsA
FileTimeToLocalFileTime
FindFirstFileA
FindResourceA
FreeLibrary
GetCPInfo
GetCommandLineA
GetConsoleOutputCP
GetCurrentProcess
GetCurrentProcessId
GetDriveTypeA
GetEnvironmentStringsA
GetFileSize
GetFileTime
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileSectionNamesA
GetProcessHeap
GetStdHandle
GetSystemTimeAsFileTime
GetTempFileNameA
GetTickCount
GetVersion
GetVersionExA
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalHandle
GlobalUnlock
HeapAlloc
HeapDestroy
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedCompareExchange
InterlockedDecrement
IsBadCodePtr
IsBadReadPtr
IsDebuggerPresent
IsValidLocale
LCMapStringA
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadResource
LocalAlloc
LockResource
Module32First
Module32Next
MulDiv
OpenEventA
OpenProcess
QueryPerformanceCounter
ReadFile
ReadProcessMemory
ReleaseMutex
RemoveDirectoryA
ResetEvent
RtlUnwind
SearchPathA
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFileAttributesA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
VirtualAlloc
VirtualProtect
VirtualQuery
WriteConsoleA
WriteFile
lstrcpyA
lstrcpynA
user32
CharNextA
CharUpperA
CreateWindowExA
DrawFocusRect
DrawTextA
EndDialog
EndPaint
GetActiveWindow
GetDesktopWindow
GetDlgItemTextA
GetSubMenu
GetSystemMetrics
GetWindowRect
InflateRect
LoadImageA
MessageBoxA
PeekMessageA
PostQuitMessage
PtInRect
RegisterWindowMessageA
SetFocus
SetForegroundWindow
SetMenu
SetTimer
SystemParametersInfoA
TranslateMessage
UnhookWindowsHookEx
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 22KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.CRT Size: 13KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.edata Size: 15KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ