Static task
static1
Behavioral task
behavioral1
Sample
917a4d40614bbfd29329033dd2d90412_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
917a4d40614bbfd29329033dd2d90412_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
917a4d40614bbfd29329033dd2d90412_JaffaCakes118
-
Size
277KB
-
MD5
917a4d40614bbfd29329033dd2d90412
-
SHA1
93680d65e402d81807a5bcadd517ed59fd1100be
-
SHA256
cc0005328ffc824f68d4ec956b84107be35580429c89a593f43654d626565ba1
-
SHA512
09cda9ddc781d49cc95e9ab8e55d62f3881f53d3f53996e7b1dbf20bfb6a4236a39aae09dfb5b924a533b305af4fb297d8d0219fd764fb93273288ac459b2dc2
-
SSDEEP
6144:r6FyHwU+uQ5Srp3ybPFQNu8MDKkqZyft8T8cEfkXb1lcD8aDiuYnNlnx5:r7zUAZSKu8U7l5cEG3oTDiVnJ5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 917a4d40614bbfd29329033dd2d90412_JaffaCakes118
Files
-
917a4d40614bbfd29329033dd2d90412_JaffaCakes118.exe windows:4 windows x86 arch:x86
b956c59907e4d0c4d315ad83d100d333
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetSidLengthRequired
RegEnumKeyExW
RegQueryInfoKeyW
RegSetValueExW
MakeAbsoluteSD
RegDeleteKeyW
GetTokenInformation
OpenThreadToken
ConvertStringSidToSidW
GetSecurityDescriptorDacl
RegCreateKeyExW
ConvertSidToStringSidW
GetSidSubAuthority
OpenProcessToken
InitializeSecurityDescriptor
InitializeSid
RegCloseKey
GetLengthSid
MakeSelfRelativeSD
InitializeAcl
IsValidSid
GetSidSubAuthorityCount
LookupAccountSidW
SetSecurityDescriptorDacl
GetSecurityDescriptorLength
EqualSid
GetSecurityDescriptorGroup
CopySid
GetSecurityDescriptorControl
SetSecurityDescriptorOwner
GetSecurityDescriptorOwner
RegOpenKeyExW
RegDeleteValueW
GetAclInformation
AddAce
GetSecurityDescriptorSacl
oleaut32
SafeArrayGetVartype
SysAllocString
SysAllocStringByteLen
SafeArrayUnlock
SysFreeString
VariantClear
VariantCopy
VarCmp
SafeArrayCreate
VariantInit
SysStringByteLen
SysAllocStringLen
SafeArrayRedim
VariantChangeType
SysStringLen
VarUI4FromStr
UnRegisterTypeLi
LoadTypeLi
VarBstrCmp
LoadRegTypeLi
SetErrorInfo
SafeArrayLock
SafeArrayGetLBound
VariantCopyInd
CreateErrorInfo
SafeArrayDestroy
RegisterTypeLi
SafeArrayCopy
SafeArrayGetUBound
kernel32
DeleteCriticalSection
LoadLibraryExW
FindResourceExW
HeapFree
HeapSize
HeapDestroy
FormatMessageW
LocalFree
SetThreadLocale
GetThreadLocale
EnterCriticalSection
HeapReAlloc
FreeLibrary
CreateEventW
UnhandledExceptionFilter
lstrlenW
LeaveCriticalSection
LoadResource
ResetEvent
GetCurrentThreadId
SizeofResource
GetModuleHandleW
IsDebuggerPresent
GetACP
LockResource
RaiseException
SetUnhandledExceptionFilter
FindResourceW
GetSystemTimeAsFileTime
GetProcessHeap
CloseHandle
lstrcmpiW
HeapAlloc
LoadLibraryA
VirtualAlloc
ole32
ProgIDFromCLSID
CoTaskMemAlloc
CoTaskMemFree
CoRevertToSelf
StringFromGUID2
CoTaskMemRealloc
CoCreateInstance
CoImpersonateClient
user32
UnregisterClassA
LoadStringW
wsprintfW
CharNextW
userenv
UnloadUserProfile
esent
JetCreateTable
JetRetrieveTaggedColumnList
JetDetachDatabase2
JetSetTableSequential
JetGetLogInfo
JetInit3
JetRetrieveColumns
JetEndExternalBackupInstance
JetGetAttachInfoInstance
JetAttachDatabase2
JetExternalRestore
ese
JetGetTruncateLogInfoInstance
JetSetSystemParameter
JetDeleteColumn2
mspatcha
GetFilePatchSignatureW
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 246KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 9KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ