Static task
static1
Behavioral task
behavioral1
Sample
f8da39a151a9f230120fe58ca908c4f0_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8da39a151a9f230120fe58ca908c4f0_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8da39a151a9f230120fe58ca908c4f0_JaffaCakes118
-
Size
264KB
-
MD5
f8da39a151a9f230120fe58ca908c4f0
-
SHA1
0d7b7124394ab361b6397885273c7891c232f306
-
SHA256
415745130b8f259ff0ac878001002ff019f904cfecf57d40cefa45fae07694aa
-
SHA512
bd8d5fa4c13f624665e15a5d83621f069effcf2d0875077a43ddac21f93288cd6dfd9b1ee1f02ada9ba8c007fc7b891bd3a3ee22a8e74b9d70bf9cddcb8f2a20
-
SSDEEP
3072:fmPV1HSUZ3Au9wss8Kg9UNLNQo7KfsqZHJ6y18Ie9uWJd4PGj88MsboHLLIL9ioq:ePV1JZrwJgGuEqZpcIM7JUssk9U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f8da39a151a9f230120fe58ca908c4f0_JaffaCakes118
Files
-
f8da39a151a9f230120fe58ca908c4f0_JaffaCakes118.exe windows:4 windows x86 arch:x86
11867c93855db434cd0343ca0fce9a16
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFlags
lstrcatA
SetErrorMode
GetFileTime
GetFileAttributesA
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
GlobalUnlock
TlsAlloc
LocalAlloc
GetVersion
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
FindNextFileA
SuspendThread
SetThreadPriority
ResumeThread
GlobalLock
GetCurrentDirectoryA
GetCurrentThread
GetCurrentThreadId
SetLastError
lstrcmpiA
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
lstrcpyA
SetEndOfFile
UnlockFile
LockFile
GetCurrentProcess
DuplicateHandle
lstrcmpA
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
UnmapViewOfFile
LoadLibraryA
FreeLibrary
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
FileTimeToSystemTime
FileTimeToLocalFileTime
GetCPInfo
GetOEMCP
SetStdHandle
GetFileType
RtlUnwind
GetTimeZoneInformation
GetSystemTimeAsFileTime
ExitProcess
TerminateProcess
GetCommandLineA
SetEnvironmentVariableA
GetSystemTime
GetLocalTime
HeapFree
HeapAlloc
RaiseException
ExitThread
HeapReAlloc
HeapSize
GetACP
SetHandleCount
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
GetVersionExA
InterlockedExchange
GetCurrentProcessId
WritePrivateProfileStringA
GetFileSize
ConnectNamedPipe
lstrlenA
DisconnectNamedPipe
CreateNamedPipeA
WriteFile
FlushFileBuffers
CreatePipe
GetStartupInfoA
CreateProcessA
SetFilePointer
ReadFile
MultiByteToWideChar
CreateFileA
GetPrivateProfileStringA
WaitForSingleObject
TerminateThread
GetTickCount
WaitForMultipleObjects
ResetEvent
CreateEventA
CreateThread
SetEvent
CloseHandle
AllocConsole
GetStdHandle
GlobalAlloc
GlobalFree
FormatMessageA
LocalFree
GetLastError
SetConsoleCtrlHandler
GetModuleHandleA
GetProcAddress
Sleep
GetModuleFileNameA
GlobalDeleteAtom
user32
CreateWindowExA
RegisterClassA
MessageBoxA
DestroyMenu
GetSysColorBrush
LoadCursorA
DefWindowProcA
MapWindowPoints
GetSysColor
AdjustWindowRectEx
DestroyWindow
LoadIconA
SystemParametersInfoA
GetClientRect
wsprintfA
CharUpperA
GetSystemMetrics
PostQuitMessage
PostMessageA
SendMessageA
SetCursor
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
SetWindowsHookExA
GetCursorPos
PeekMessageA
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
DispatchMessageA
TranslateMessage
GetMessageA
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
CopyRect
GetTopWindow
GetCapture
WinHelpA
GetClassInfoA
GetMenu
GetSubMenu
GetMenuItemID
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
RegisterWindowMessageA
UnregisterClassA
IsIconic
GetWindowPlacement
SetFocus
ShowWindow
SetWindowPos
SetWindowLongA
GetDlgItem
GrayStringA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
GetMenuItemCount
GetWindowTextA
SetWindowTextA
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
PtInRect
GetClassNameA
UnhookWindowsHookEx
LoadStringA
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
gdi32
GetDeviceCaps
GetClipBox
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
SetTextColor
SetBkColor
GetStockObject
SelectObject
RestoreDC
SaveDC
DeleteDC
DeleteObject
CreateBitmap
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetObjectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
DeleteService
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenSCManagerA
CreateServiceA
CloseServiceHandle
StartServiceCtrlDispatcherA
GetUserNameA
LookupAccountNameA
IsValidSid
GetLengthSid
CopySid
QueryServiceStatus
ControlService
OpenServiceA
RegDeleteValueA
StartServiceA
RegisterServiceCtrlHandlerA
DeregisterEventSource
RegCreateKeyExA
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegisterEventSourceA
ReportEventA
SetServiceStatus
comctl32
ord17
wsock32
WSAStartup
WSACleanup
gethostname
gethostbyname
recvfrom
ntohs
sendto
inet_addr
accept
socket
htons
bind
listen
recv
send
WSAGetLastError
setsockopt
closesocket
htonl
ntohl
ioctlsocket
Sections
.text Size: 212KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE