Static task
static1
Behavioral task
behavioral1
Sample
e283f87211b378866c5317c19010cd33_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e283f87211b378866c5317c19010cd33_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e283f87211b378866c5317c19010cd33_JaffaCakes118
-
Size
1.4MB
-
MD5
e283f87211b378866c5317c19010cd33
-
SHA1
04173d322dc94c437c931b840db063bb1c719b01
-
SHA256
46f6ef68292bd27889de695d6609365699562ca409309095d4894be0eccbfe77
-
SHA512
e08e8e5ba4413f67d7ca1d22fb263a3ea7a671b910679942c9a60608befee26dda56840ab015434b01da2c2d622e8bd9dffeaa88b073b9412b03715e341d927d
-
SSDEEP
24576:dVLETxMQCiKTiX7k6T3lSjRMLjw+1+eZqhQf4iyfxTft1V:dVLEpC/c7vTVQmLEoOQf4tfxTfp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e283f87211b378866c5317c19010cd33_JaffaCakes118
Files
-
e283f87211b378866c5317c19010cd33_JaffaCakes118.exe windows:5 windows x86 arch:x86
c51014d34d7392d0a380d7c39ac9ad32
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrChrA
PathFileExistsA
StrStrA
StrStrIA
wnsprintfA
StrToIntA
StrNCatA
rpcrt4
UuidCreate
UuidToStringA
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
kernel32
DeleteFileA
GetPrivateProfileStringA
WritePrivateProfileStringA
GetComputerNameA
GetVolumeInformationA
Sleep
CreateThread
GetLocalTime
GetVersionExA
lstrcpyA
GetTickCount
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
ExpandEnvironmentStringsA
OpenProcess
LocalFree
MoveFileExA
GetExitCodeProcess
lstrcatA
GetModuleFileNameA
GetTempPathA
GetFileAttributesA
FindFirstFileA
FindClose
FindNextFileA
GetFileSize
WaitForSingleObject
CreateProcessA
ReadFile
CreateDirectoryA
WinExec
ExitProcess
CreateMutexA
MultiByteToWideChar
LocalAlloc
GetModuleHandleA
TerminateProcess
GetCurrentProcessId
GetFullPathNameA
DosDateTimeToFileTime
SetFileTime
GetFileTime
LocalFileTimeToFileTime
WideCharToMultiByte
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetStdHandle
SetHandleCount
VirtualAlloc
LoadLibraryA
DeleteCriticalSection
VirtualFree
HeapCreate
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
GetFileType
GetModuleHandleW
LeaveCriticalSection
EnterCriticalSection
HeapReAlloc
GetSystemTimeAsFileTime
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Process32First
InterlockedDecrement
lstrcpynA
MapViewOfFile
GetProcAddress
GetConsoleCP
GetLocaleInfoA
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetConsoleMode
SetFilePointer
SetEndOfFile
FreeEnvironmentStringsA
GetCurrentProcess
FreeLibrary
WriteFile
GetProcessHeap
HeapFree
HeapAlloc
OpenMutexA
CreateFileA
lstrcmpiA
lstrlenA
lstrcmpA
OpenFileMappingA
CloseHandle
CreateToolhelp32Snapshot
CreateFileMappingA
Process32Next
GetLastError
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
HeapSize
GetStringTypeA
GetStringTypeW
user32
RedrawWindow
GetWindowTextLengthA
IsDlgButtonChecked
CheckRadioButton
EnableWindow
GetDlgItem
SetWindowTextA
GetUserObjectSecurity
GetWindowThreadProcessId
GetShellWindow
GetWindowDC
DrawFocusRect
GetDlgCtrlID
SetCursor
SetFocus
EndPaint
GetKeyState
GetFocus
LoadBitmapA
GetParent
IsWindowEnabled
BeginPaint
GetDC
DrawEdge
SetWindowLongA
InvalidateRect
ReleaseDC
PostMessageA
UpdateWindow
DestroyWindow
keybd_event
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
LoadIconA
GetClientRect
SendMessageA
IsDialogMessageA
TranslateMessage
MapVirtualKeyA
MessageBoxA
GetWindowLongA
CreateWindowExA
DefWindowProcA
SetWindowPos
ShowWindow
DispatchMessageA
SystemParametersInfoA
LoadCursorA
FindWindowA
DrawTextA
PeekMessageA
MoveWindow
ExitWindowsEx
EnumWindows
GetClassNameA
GetWindowTextA
FillRect
gdi32
CreateSolidBrush
BitBlt
SetTextColor
DeleteDC
CreateFontA
SetBkMode
DeleteObject
SetBkColor
CreateCompatibleDC
GetTextExtentPointA
GetObjectA
GetStockObject
TextOutA
SelectObject
CreateDIBitmap
advapi32
RegDeleteKeyA
RegSetValueExA
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
OpenSCManagerA
QueryServiceStatus
CloseServiceHandle
OpenServiceA
SetEntriesInAclA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
OpenProcessToken
RegCreateKeyA
AllocateAndInitializeSid
RegEnumKeyA
AdjustTokenPrivileges
FreeSid
CheckTokenMembership
ConvertSidToStringSidA
LookupPrivilegeValueA
GetSecurityDescriptorOwner
IsValidSid
RegCloseKey
shell32
SHGetFolderPathA
ShellExecuteExA
ShellExecuteA
ole32
CoTaskMemAlloc
oleaut32
VariantClear
Sections
.text Size: 162KB - Virtual size: 161KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ