Static task
static1
Behavioral task
behavioral1
Sample
783046ec5c35f3a18183a5baa584af1a_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
783046ec5c35f3a18183a5baa584af1a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
783046ec5c35f3a18183a5baa584af1a_JaffaCakes118
-
Size
295KB
-
MD5
783046ec5c35f3a18183a5baa584af1a
-
SHA1
fbe2b5a9093053fb74772ab3333dea3b1be6dd7d
-
SHA256
d8ff8f1112ae1c0c9ab48daaf74dc0044e9b9333b06b8efd808b52c362c0d170
-
SHA512
81a8056e6a0ba23740045f6028e9cab5c1382fe3e32d6d30f9446bbc3ef975088c618022beab9eb469690b1786267e43032a2ae988ac9d27c89659dad38b0fc0
-
SSDEEP
6144:j9Ncj86i7QaMyUtZahwg5dmgFDMH5hhZOxHg7SbOr16p+Baemv+:ch7tZkwgy9ZhbOZCSbOgPv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 783046ec5c35f3a18183a5baa584af1a_JaffaCakes118
Files
-
783046ec5c35f3a18183a5baa584af1a_JaffaCakes118.exe windows:5 windows x86 arch:x86
40384d367edeb90e29e67413f56c5609
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetForegroundWindow
FindWindowExA
FindWindowExW
GetSystemMetrics
ExitWindowsEx
CharPrevA
MessageBoxA
SendMessageA
PostMessageA
CharUpperA
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
advapi32
RegCloseKey
SetSecurityDescriptorDacl
RevertToSelf
InitializeSecurityDescriptor
RegQueryValueExA
OpenProcessToken
SetTokenInformation
RegQueryValueExW
RegOpenKeyExA
ImpersonateSelf
RegOpenKeyExW
GetUserNameA
RegDeleteValueA
GetTokenInformation
RegSetValueExA
RegQueryInfoKeyA
ImpersonateLoggedOnUser
AdjustTokenPrivileges
RegEnumKeyExA
LookupPrivilegeValueA
DuplicateTokenEx
oleaut32
SysFreeString
SysAllocStringByteLen
kernel32
GetProcessHeap
HeapAlloc
GetCurrentDirectoryA
WaitForSingleObject
GetShortPathNameA
HeapFree
ProcessIdToSessionId
lstrlenA
FormatMessageA
GetLocalTime
GetDateFormatA
SetLastError
LocalFree
FreeLibrary
EnterCriticalSection
WritePrivateProfileStringA
DeleteCriticalSection
lstrcpynA
GetCurrentThreadId
LeaveCriticalSection
LoadLibraryExA
GetWindowsDirectoryA
CopyFileA
DeleteFileA
MoveFileExA
lstrcmpiA
GetModuleHandleA
GetTempFileNameA
GetPrivateProfileStringA
CloseHandle
ReleaseMutex
GetACP
GetCommandLineW
GetComputerNameA
OpenProcess
GetCommandLineA
WideCharToMultiByte
CreateEventA
CreateProcessA
CreateMutexA
IsValidCodePage
VirtualAlloc
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
shlwapi
PathFileExistsA
PathRemoveFileSpecA
iphlpapi
GetTcpTable
GetUdpTable
GetIcmpStatistics
InternalGetIpAddrTable
UnenableRouter
InternalDeleteIpForwardEntry
GetIpStatistics
NhGetInterfaceNameFromGuid
DeleteIpNetEntry
GetIpAddrTable
rnr20
NSPStartup
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 264KB - Virtual size: 443KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ