Static task
static1
Behavioral task
behavioral1
Sample
0d3571a8ca8ef2fede9e3e11b8761582_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0d3571a8ca8ef2fede9e3e11b8761582_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0d3571a8ca8ef2fede9e3e11b8761582_JaffaCakes118
-
Size
368KB
-
MD5
0d3571a8ca8ef2fede9e3e11b8761582
-
SHA1
f2b0416e2afe93050816f62646ecae6080a9e559
-
SHA256
543144026b1a0c1bbfea07c5af4b9e5654c6eb3416f7ac70d676c6c8682bacbb
-
SHA512
1474d517cf92cd4dcec62bb656ae918f383fd4e146dd951c9613e7cb300870e32606c3607872bb17d84e2de5c13d23bf51bc16e8f2f576acd4bae9fe3e2b661c
-
SSDEEP
6144:lysifNvmGSKiUuyWvY1ZEYVG3I825tkB9GqlzXwOwNM5s8Fy:8BQUuy6kP5tU1lzXwBqbs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0d3571a8ca8ef2fede9e3e11b8761582_JaffaCakes118
Files
-
0d3571a8ca8ef2fede9e3e11b8761582_JaffaCakes118.exe windows:4 windows x86 arch:x86
e80816cb0048a9ef17216a2d5a01a92d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__dllonexit
_unlock
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
rand
_tell
_onexit
_CItanh
gdi32
CreateSolidBrush
GetTextAlign
EnumFontsW
CreateICW
ScaleWindowExtEx
ExtTextOutA
GetRgnBox
StrokePath
GetWindowOrgEx
SetPolyFillMode
Polyline
PatBlt
GetObjectA
SetWindowOrgEx
GetMapMode
CreateICA
SetBitmapBits
FillPath
CreateBitmap
LPtoDP
SetBkMode
ExtCreateRegion
Ellipse
EndPath
DeleteDC
UpdateColors
CreateDCW
EnumMetaFile
SetPixelFormat
GetDIBColorTable
Rectangle
SetAbortProc
SetWinMetaFileBits
GetEnhMetaFileHeader
OffsetWindowOrgEx
CreateDIBPatternBrushPt
GetStockObject
SelectClipRgn
CopyEnhMetaFileW
GetBkColor
CreateFontW
RectVisible
SetRectRgn
GetTextColor
GdiFlush
advapi32
RegOpenKeyExW
SetNamedSecurityInfoA
GetFileSecurityA
SetThreadToken
GetSecurityDescriptorLength
CreateProcessAsUserA
IsValidSid
SetSecurityDescriptorDacl
IsValidSecurityDescriptor
GetSecurityDescriptorOwner
LookupAccountNameW
RegConnectRegistryA
RegEnumKeyW
RegDeleteKeyA
RegSetValueA
GetKernelObjectSecurity
GetSidSubAuthorityCount
SetSecurityDescriptorOwner
CopySid
SetEntriesInAclW
RegOpenKeyExA
StartServiceA
ReadEventLogW
AddAce
GetAclInformation
CreateProcessAsUserW
RegQueryInfoKeyW
ControlService
StartServiceCtrlDispatcherW
RegCreateKeyExA
MakeAbsoluteSD
QueryServiceStatus
GetFileSecurityW
ChangeServiceConfig2A
RegisterServiceCtrlHandlerW
RegCloseKey
OpenThreadToken
GetUserNameW
GetLengthSid
DecryptFileW
InitiateSystemShutdownA
ChangeServiceConfigA
GetServiceDisplayNameW
RegSetKeySecurity
RegSetValueExA
SetNamedSecurityInfoW
GetSidLengthRequired
LookupPrivilegeValueA
SetFileSecurityA
EnumDependentServicesA
CloseServiceHandle
AllocateAndInitializeSid
RegCreateKeyW
ChangeServiceConfig2W
RegUnLoadKeyW
OpenSCManagerW
AdjustTokenPrivileges
RegisterServiceCtrlHandlerA
FreeSid
ReportEventW
SetKernelObjectSecurity
OpenServiceA
OpenSCManagerA
SetFileSecurityW
EnumServicesStatusA
OpenProcessToken
LookupPrivilegeValueW
SetSecurityDescriptorGroup
SetServiceObjectSecurity
user32
SendMessageA
kernel32
GetStartupInfoA
CreateEventA
GlobalReAlloc
GetWindowsDirectoryA
Process32First
GetModuleHandleA
GetStartupInfoA
CreateEventA
GlobalReAlloc
GetWindowsDirectoryA
Process32First
GetModuleHandleA
mpr
WNetAddConnection2A
WNetConnectionDialog1A
Sections
.text Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ