Static task
static1
Behavioral task
behavioral1
Sample
a605501dd8c630d67d361260db66960f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a605501dd8c630d67d361260db66960f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a605501dd8c630d67d361260db66960f_JaffaCakes118
-
Size
295KB
-
MD5
a605501dd8c630d67d361260db66960f
-
SHA1
4d7937e4854b82a5fa715765b381c013bde607cc
-
SHA256
9253ed48b5b703795a55f560528b16e4dc65fd62cc31fdcfcf7a32568e1b69f3
-
SHA512
1104983cf114a994c921471ebe756678c5da1dcc276985dedec19f8816edcaa687c0c519ec1d6159b9a3ef0cfa787c10bc737d5536b30772793359db64aaa0e6
-
SSDEEP
6144:g9Ncj86i7QaMyUtZahwg5dmgFDMH5hhZOxHg7SbOr16p+Baemv+:5h7tZkwgy9ZhbOZCSbOgPv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a605501dd8c630d67d361260db66960f_JaffaCakes118
Files
-
a605501dd8c630d67d361260db66960f_JaffaCakes118.exe windows:5 windows x86 arch:x86
40384d367edeb90e29e67413f56c5609
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetForegroundWindow
FindWindowExA
FindWindowExW
GetSystemMetrics
ExitWindowsEx
CharPrevA
MessageBoxA
SendMessageA
PostMessageA
CharUpperA
ole32
CoInitializeEx
CoUninitialize
CoCreateInstance
advapi32
RegCloseKey
SetSecurityDescriptorDacl
RevertToSelf
InitializeSecurityDescriptor
RegQueryValueExA
OpenProcessToken
SetTokenInformation
RegQueryValueExW
RegOpenKeyExA
ImpersonateSelf
RegOpenKeyExW
GetUserNameA
RegDeleteValueA
GetTokenInformation
RegSetValueExA
RegQueryInfoKeyA
ImpersonateLoggedOnUser
AdjustTokenPrivileges
RegEnumKeyExA
LookupPrivilegeValueA
DuplicateTokenEx
oleaut32
SysFreeString
SysAllocStringByteLen
kernel32
GetProcessHeap
HeapAlloc
GetCurrentDirectoryA
WaitForSingleObject
GetShortPathNameA
HeapFree
ProcessIdToSessionId
lstrlenA
FormatMessageA
GetLocalTime
GetDateFormatA
SetLastError
LocalFree
FreeLibrary
EnterCriticalSection
WritePrivateProfileStringA
DeleteCriticalSection
lstrcpynA
GetCurrentThreadId
LeaveCriticalSection
LoadLibraryExA
GetWindowsDirectoryA
CopyFileA
DeleteFileA
MoveFileExA
lstrcmpiA
GetModuleHandleA
GetTempFileNameA
GetPrivateProfileStringA
CloseHandle
ReleaseMutex
GetACP
GetCommandLineW
GetComputerNameA
OpenProcess
GetCommandLineA
WideCharToMultiByte
CreateEventA
CreateProcessA
CreateMutexA
IsValidCodePage
VirtualAlloc
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
shlwapi
PathFileExistsA
PathRemoveFileSpecA
iphlpapi
GetTcpTable
GetUdpTable
GetIcmpStatistics
InternalGetIpAddrTable
UnenableRouter
InternalDeleteIpForwardEntry
GetIpStatistics
NhGetInterfaceNameFromGuid
DeleteIpNetEntry
GetIpAddrTable
rnr20
NSPStartup
Sections
.text Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 264KB - Virtual size: 443KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ