Static task
static1
Behavioral task
behavioral1
Sample
c78ad25795300ed3c4ed7f3d2cdb8b51_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
c78ad25795300ed3c4ed7f3d2cdb8b51_JaffaCakes118
-
Size
786KB
-
MD5
c78ad25795300ed3c4ed7f3d2cdb8b51
-
SHA1
62f9bbf935d54415eadf7fdb72b1640ac4ac390e
-
SHA256
2b6f62b7b957100080f851c141e79a09c394750332d445d5c00b9c5b8bf20401
-
SHA512
0889c4511ca3f6cfb1c4f875de5d0432518f0c14a6328991397e1b7003d80cfb0512f76c19f5af51bbdbedc607c917f98b265fd959e3124d038da077e526050d
-
SSDEEP
12288:vyxPJa2s86jofrWEuxjcZxyPq8tf8sQ+PRtj3lDsmMHj3N6eiaFmhL+Jig8:vyxPJ/s86szWEuKiflOmMDhPEhL+l8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c78ad25795300ed3c4ed7f3d2cdb8b51_JaffaCakes118
Files
-
c78ad25795300ed3c4ed7f3d2cdb8b51_JaffaCakes118.exe windows:5 windows x86 arch:x86
7ce5ed27d4bed277ca4562933102c47c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
GetACP
MultiByteToWideChar
FlushFileBuffers
GetFileSizeEx
GetLastError
VirtualAlloc
RemoveDirectoryA
SetStdHandle
GetLocalTime
QueryPerformanceFrequency
CloseHandle
GetCurrentProcessId
GetSystemTime
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetModuleFileNameW
ReadFile
GetProcessHeap
HeapSize
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetFilePointer
IsValidCodePage
GetOEMCP
GetCPInfo
CreateFileA
HeapReAlloc
VirtualFree
HeapCreate
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetFileAttributesA
CreateEventA
Sleep
IsValidLocale
WideCharToMultiByte
OpenProcess
GetProcessTimes
WriteFile
GetDateFormatA
GetTickCount
WaitForSingleObject
QueryPerformanceCounter
CompareFileTime
SystemTimeToFileTime
SetFilePointerEx
SystemTimeToTzSpecificLocalTime
SetEndOfFile
GetLocaleInfoA
GetFileSize
GetSystemDefaultLangID
DeleteCriticalSection
GetModuleFileNameA
GetStdHandle
GetConsoleMode
GetConsoleCP
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
ExitProcess
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleA
user32
BeginPaint
GetShellWindow
CheckMenuItem
SetDlgItemTextA
GetCaretBlinkTime
GetDlgItemTextA
ClientToScreen
GetWindowRect
SendDlgItemMessageA
TrackPopupMenu
GetWindowDC
MsgWaitForMultipleObjects
GetSubMenu
FindWindowA
GetParent
InvalidateRgn
GetClipboardFormatNameA
GetClientRect
SendMessageA
SetMenuItemBitmaps
EnumWindows
GetDC
GetForegroundWindow
SetWindowContextHelpId
GetWindowTextA
TranslateAcceleratorA
SetWindowPos
IsDlgButtonChecked
SetMenuInfo
GetMenuItemCount
CheckRadioButton
GetSystemMetrics
UpdateWindow
gdi32
FloodFill
GetBkMode
DeleteDC
SetPixel
CreateBitmap
DeleteObject
SelectObject
CreateCompatibleDC
FillRgn
GetBkColor
GetPixel
GetObjectA
GetStockObject
BitBlt
advapi32
RegCloseKey
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
shell32
SHBindToParent
SHGetFolderLocation
SHGetFolderPathW
ole32
CoTaskMemFree
CoInitialize
CoCreateInstance
StringFromCLSID
oleaut32
LoadTypeLi
VariantInit
SysAllocStringLen
VariantChangeType
winmm
timeGetTime
shlwapi
PathAppendW
Sections
.text Size: 210KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 518KB - Virtual size: 518KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ