Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_057af863d934533754ad9ae12c2def66.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_057af863d934533754ad9ae12c2def66
-
Size
850KB
-
MD5
057af863d934533754ad9ae12c2def66
-
SHA1
1716116ed561d5a99d7f654f84fb756c8be22046
-
SHA256
91371f405dcb6439a53162611b872179c20b57f0973edfef3e6d58683d89b0b9
-
SHA512
1c778ae8873c7bac9acf2f367a1c6ea2b513bd9f2c2d0c25ec348827540a770f676ee00d7571c5b3d9d7038ad674229e79f4e34c5f8fcfb4c9bdd0eeed7286db
-
SSDEEP
12288:SQ8AdEpzX9+R+wySg0Ax2Gpfs8ynk5MxtaUxYye3pex1re0+c9NYcNr:NupzBwygAoGp6pxJ0pexhe0+c9Nr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JaffaCakes118_057af863d934533754ad9ae12c2def66
Files
-
JaffaCakes118_057af863d934533754ad9ae12c2def66.exe windows:4 windows x86 arch:x86
170c67596f2a492c83baaf85ab87a6de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
GetUserNameW
LookupPrivilegeValueW
OpenProcessToken
RegCloseKey
RegCreateKeyW
RegDeleteKeyW
RegOpenKeyExW
RegQueryValueExW
RegSetValueW
gdi32
CreateFontIndirectW
DeleteObject
GetObjectW
GetStockObject
SelectObject
SetBkMode
SetTextColor
kernel32
CreateThread
DeleteCriticalSection
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FreeLibrary
GetCommandLineA
GetLastError
GetModuleHandleA
GetProcAddress
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
SetUnhandledExceptionFilter
TlsGetValue
VirtualProtect
VirtualQuery
WaitForSingleObject
lstrlenA
msvcrt
_strdup
_stricoll
__getmainargs
__mb_cur_max
__p__environ
__p__fmode
__set_app_type
_cexit
_errno
_fpreset
_fullpath
_iob
_isctype
_onexit
_pctype
_setmode
_strdup
abort
atexit
calloc
free
fwrite
malloc
mbstowcs
memcpy
realloc
setlocale
signal
strcoll
strlen
tolower
vfprintf
wcstombs
user32
CheckDlgButton
ClientToScreen
CloseClipboard
CreateWindowExW
DefWindowProcW
DestroyWindow
EmptyClipboard
EnableWindow
EndDialog
FindWindowW
GetClipboardData
GetCursorPos
GetDlgItem
GetDlgItemInt
GetDlgItemTextW
GetMessageW
GetScrollInfo
GetWindowLongW
GetWindowPlacement
IsClipboardFormatAvailable
LoadAcceleratorsW
LoadBitmapW
LoadCursorW
LoadIconW
LoadMenuW
MessageBoxW
MoveWindow
OpenClipboard
PeekMessageW
PostMessageW
RegisterClassExW
ReleaseCapture
SetCapture
SetClipboardData
SetDlgItemTextW
SetForegroundWindow
SetScrollInfo
SetWindowLongW
SetWindowPlacement
SetWindowPos
ShowWindow
UpdateWindow
Sections
.text Size: 580KB - Virtual size: 579KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 182KB - Virtual size: 181KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1024B - Virtual size: 968B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 176B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ