Static task
static1
Behavioral task
behavioral1
Sample
414845d4cd36b88ed6e155a4761293df_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
414845d4cd36b88ed6e155a4761293df_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
414845d4cd36b88ed6e155a4761293df_JaffaCakes118
-
Size
172KB
-
MD5
414845d4cd36b88ed6e155a4761293df
-
SHA1
2b2c965fd3fd3d777295fdca8a22aaea5e1f947b
-
SHA256
a23e2ccc7a62bfc045c7ca72314f00092733dfb62551cdcf762fcb55b17ad11d
-
SHA512
a12021b2e005bcc91d0c2403f09917958af473ef37a12a50772cc1600f1d54cdedd1fc1624da977a0e7106cb3a39df400af14ba285174f46c1716ee1a8f87386
-
SSDEEP
1536:rX1egtfGJhkQybVLnVvV6QZSKgZCTJbI0RWSKvft23Yo35x9jR66Lll9QMHDJ013:r9tikxLtVeKg0fRWSYt2N9RwfP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 414845d4cd36b88ed6e155a4761293df_JaffaCakes118
Files
-
414845d4cd36b88ed6e155a4761293df_JaffaCakes118.exe windows:4 windows x86 arch:x86
01dff8c9d3b6d5da21e656391fe4df77
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
WideCharToMultiByte
FreeLibrary
TerminateProcess
CreateProcessA
DuplicateHandle
GetCurrentProcess
OpenProcess
WriteFile
GetStartupInfoA
GetModuleHandleA
GetVersionExA
CreateFileA
Sleep
GetLastError
GetModuleFileNameA
WinExec
GetSystemDirectoryA
GetFileAttributesExA
SetFileTime
CloseHandle
WaitForSingleObject
user32
GetDesktopWindow
DispatchMessageA
TranslateMessage
GetMessageA
RegisterClassExA
DefWindowProcA
PostQuitMessage
ShowWindow
CreateWindowExA
SendMessageTimeoutA
RegisterWindowMessageA
GetClassNameA
PostMessageA
EnumChildWindows
GetWindowThreadProcessId
EnumWindows
advapi32
StartServiceA
OpenSCManagerA
ConvertSidToStringSidA
LookupAccountNameA
GetUserNameA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
DeleteService
OpenServiceA
CreateServiceA
CloseServiceHandle
shell32
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
oleaut32
SysFreeString
VariantClear
shlwapi
SHGetValueA
SHSetValueA
msvcrt
fwrite
_stricmp
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
__CxxFrameHandler
strstr
strchr
atoi
wcslen
??2@YAPAXI@Z
??3@YAXPAX@Z
fopen
_strlwr
sprintf
rand
srand
time
_access
fclose
fflush
dbghelp
ImageNtHeader
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
odata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ndata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
mdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
edata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cdata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
idata Size: 4KB - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ