Static task
static1
Behavioral task
behavioral1
Sample
36ab471a323df6335d6fa0c2f35555ec_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
36ab471a323df6335d6fa0c2f35555ec_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
36ab471a323df6335d6fa0c2f35555ec_JaffaCakes118
-
Size
264KB
-
MD5
36ab471a323df6335d6fa0c2f35555ec
-
SHA1
6cd00c2725d4bcee81c1039e6920b7878ef34cc3
-
SHA256
d4f2c3c2bfc1c5b8fcbb7138649224c3ecefb34ab36decad0ddc6f8b7f32c99c
-
SHA512
6b5ffb0bf831b4df3d6cab7d4bbc26aca43981ddb412a9f19a9d71e882da9f8ba6230a9fdf2e0e6fae7e8f3f8b0512cea8e3ab6083e41c23f406742ffbbf2f85
-
SSDEEP
6144:sYkTjU4HjBdyctYrT7/PsW8EZd40seWs9Zxip:6UWbtYLPsfEHlWs9ap
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 36ab471a323df6335d6fa0c2f35555ec_JaffaCakes118
Files
-
36ab471a323df6335d6fa0c2f35555ec_JaffaCakes118.exe windows:4 windows x86 arch:x86
26972750cd5f63a1433b2c771010f2fb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcp60
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??9std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??0_Lockit@std@@QAE@XZ
??1_Lockit@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
msvcrt
memcpy
rand
srand
time
_mbsstr
memset
__CxxFrameHandler
strlen
??2@YAPAXI@Z
??1type_info@@UAE@XZ
_CxxThrowException
_onexit
__dllonexit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_strnicmp
_strlwr
_itoa
_stricmp
_ltoa
sprintf
strcat
strcpy
strcmp
_XcptFilter
_exit
free
_ftol
ceil
_mbsnbcpy
sscanf
_snprintf
memcmp
_except_handler3
_mbsupr
_mbsrchr
strncpy
strncat
strstr
historyinfo_manage
get_version
get_category_info
uninit
get_item_info
init
get_root_info
shlwapi
SHSetValueA
PathCombineA
SHDeleteKeyA
SHGetValueA
kernel32
CloseHandle
Sleep
TerminateProcess
OpenProcess
SystemTimeToFileTime
GetLocalTime
GetFileTime
CreateFileA
WaitForSingleObject
SetEvent
OpenEventA
MoveFileExA
GetStartupInfoA
GetSystemTime
ReadFile
IsBadWritePtr
CreateProcessA
RemoveDirectoryA
SetFileAttributesA
FindClose
GetProcessHeap
HeapAlloc
GetModuleHandleA
HeapFree
lstrcpyA
lstrlenA
MultiByteToWideChar
LocalFree
GetVersionExA
CopyFileA
lstrcmpiA
LoadLibraryA
GetProcAddress
FreeLibrary
CreateDirectoryA
GetModuleFileNameA
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
OutputDebugStringA
GetFileAttributesA
FindNextFileA
DeleteFileA
FindFirstFileA
GetLastError
user32
DialogBoxParamA
RegisterWindowMessageA
SendMessageA
wsprintfA
GetDlgItem
EndDialog
CharLowerBuffA
GetWindowThreadProcessId
FindWindowA
PostMessageA
advapi32
GetAclInformation
RegEnumKeyExA
RegOpenKeyExA
SetNamedSecurityInfoA
SetEntriesInAclA
BuildExplicitAccessWithNameA
GetEffectiveRightsFromAclA
BuildTrusteeWithNameA
GetNamedSecurityInfoA
RegCloseKey
RegQueryValueExA
SetFileSecurityA
GetSecurityDescriptorControl
SetSecurityDescriptorDacl
RegOpenKeyA
RegSetValueExA
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
RegDeleteKeyA
GetLengthSid
InitializeAcl
GetAce
EqualSid
AddAce
AddAccessAllowedAce
ole32
CoUninitialize
CoCreateInstance
StgOpenStorage
StgCreateDocfile
CoInitialize
CLSIDFromProgID
oleaut32
SysFreeString
SysAllocStringLen
VariantClear
SysAllocString
shell32
ShellExecuteA
SHGetSpecialFolderPathA
SHFileOperationA
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
historyinfotransfer
historyinfoTransfer
Sections
.text Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tc Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE