Static task
static1
Behavioral task
behavioral1
Sample
edde7a33e1a41f30e25412a44e50a930_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
edde7a33e1a41f30e25412a44e50a930_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
edde7a33e1a41f30e25412a44e50a930_JaffaCakes118
-
Size
425KB
-
MD5
edde7a33e1a41f30e25412a44e50a930
-
SHA1
956fe7309a867012eb32300c6e10b9116ae1b298
-
SHA256
9278550fe5066f8161beaed97d71eeb7f995cc8406f5af652ba332686d9d9137
-
SHA512
04dc331712b9e6da60227c4efd57e2c729b37f141fc27de66b7046a5c7cddda0bcd3f7823c908d6691db2d990327f9c3ee927449ac263146f2defc01494e2e72
-
SSDEEP
6144:G9mcypSXaS5UOUdLdsJ9z5CR6wyKMlZlc3G0B/cNN/ws8vnbUumaXxLcatV+qK1:G8cVbRUDY9A3Q43G0llvnbUNahLc8U1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource edde7a33e1a41f30e25412a44e50a930_JaffaCakes118
Files
-
edde7a33e1a41f30e25412a44e50a930_JaffaCakes118.exe windows:4 windows x86 arch:x86
6aa3a4637753edfad72f2261a5ec3344
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DispatchMessageA
CreatePopupMenu
GetClassLongW
DdeReconnect
EnumPropsExA
EnumDisplaySettingsExA
DefWindowProcW
CreateMDIWindowW
DrawTextExW
CloseClipboard
GetDesktopWindow
CreateDialogParamA
DdeCreateStringHandleW
ExcludeUpdateRgn
EnumDesktopsA
CreateAcceleratorTableW
msvcrt
_umask
_safe_fprem
_ismbcalpha
_tzset
_pgmptr
_wpopen
_execl
_wmktemp
_CItan
cos
_environ
_dup
strtok
_heapused
_execvpe
__setlc_active
iswspace
_ismbbkana
__lc_codepage
_XcptFilter
_wcsset
_fcvt
_getdiskfree
_wcsnicoll
_wcsicmp
wcsncmp
_fsopen
_y1
_adj_fdiv_m32
_chdir
_isctype
atoi
_splitpath
_j0
_CxxThrowException
_beginthreadex
__p__fmode
iswprint
_wmakepath
advapi32
SetNamedSecurityInfoExW
RegGetKeySecurity
GetNamedSecurityInfoExW
RegCreateKeyExW
BuildTrusteeWithNameW
CryptGenRandom
BuildSecurityDescriptorW
LsaEnumerateAccountRights
LsaClearAuditLog
AddAuditAccessAce
NotifyBootConfigStatus
OpenSCManagerW
LsaQueryInfoTrustedDomain
ElfOpenBackupEventLogW
LsaFreeMemory
ConvertAccessToSecurityDescriptorA
GetKernelObjectSecurity
CreateServiceA
CopySid
kernel32
UnlockFileEx
GlobalUnlock
GetLocaleInfoW
SetSystemPowerState
GetModuleHandleA
GlobalGetAtomNameW
SetLocalTime
FindFirstFileExA
InitAtomTable
GetComputerNameA
GetAtomNameA
GetLogicalDriveStringsA
Sleep
HeapLock
IsDBCSLeadByte
ExitThread
EnumSystemCodePagesW
CreateThread
ExitProcess
SetConsoleInputExeNameA
GetStartupInfoA
LocalHandle
WaitForSingleObjectEx
GetProfileIntW
WriteConsoleInputVDMA
VirtualAlloc
GetPrivateProfileStringW
GetCurrencyFormatW
GlobalFindAtomA
HeapCreate
FreeEnvironmentStringsW
VirtualFree
GetModuleHandleW
lstrlenW
IsBadWritePtr
Toolhelp32ReadProcessMemory
WriteProfileStringA
GetCurrentProcessId
GetFileAttributesExA
EnumTimeFormatsW
ReadConsoleInputExW
SetCurrentDirectoryA
Heap32ListNext
GetTapeParameters
EraseTape
PostQueuedCompletionStatus
comdlg32
ChooseColorA
gdi32
GetStretchBltMode
GetArcDirection
GetMapMode
CopyEnhMetaFileA
GetBitmapDimensionEx
GetViewportExtEx
EndPath
GetICMProfileW
GetGraphicsMode
GetTextExtentExPointA
SetBrushOrgEx
UpdateICMRegKeyW
EnumFontFamiliesExW
CreateDIBitmap
CreateBitmap
GdiGetBatchLimit
Sections
.text Size: 8KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.dmdgw Size: 123KB - Virtual size: 375KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lmlx Size: 49KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.eutts Size: 243KB - Virtual size: 331KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ