Static task
static1
Behavioral task
behavioral1
Sample
f7312f4dafb4d4195c53b448a4cbffc9_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f7312f4dafb4d4195c53b448a4cbffc9_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f7312f4dafb4d4195c53b448a4cbffc9_JaffaCakes118
-
Size
327KB
-
MD5
f7312f4dafb4d4195c53b448a4cbffc9
-
SHA1
0a108eebfc3c80babe6a7140e60e9a048ce642c1
-
SHA256
212a80234a684572a57f3af62d959187bd031a2021986a25f8ef6aed082a1a0e
-
SHA512
f01ceca61093abb43cebf8633a18b77e2199916729fc8894e7db182f69b25f104cf910bb062c77d736addb2deb9a4fec95648ad309609b663b47d372eafe16ac
-
SSDEEP
6144:1Uyhttbs/ydsG5jBTkC+ajYqGucqpoKC64C:my7tYads6jCrajYqcEogx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f7312f4dafb4d4195c53b448a4cbffc9_JaffaCakes118
Files
-
f7312f4dafb4d4195c53b448a4cbffc9_JaffaCakes118.exe windows:4 windows x86 arch:x86
bd0f2db1908715a413448ef0229544d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ExtractAssociatedIconExW
SHFileOperation
comctl32
InitCommonControlsEx
user32
GetTitleBarInfo
OpenDesktopA
DestroyIcon
GetIconInfo
CharPrevExA
LoadAcceleratorsW
AnyPopup
CharNextA
SendNotifyMessageA
LoadMenuIndirectW
BlockInput
GetKeyState
EnableScrollBar
GetNextDlgGroupItem
IsClipboardFormatAvailable
RegisterClassA
SetClipboardData
LoadAcceleratorsA
OpenWindowStationW
RegisterClassExA
SetCapture
wininet
GopherCreateLocatorA
UnlockUrlCacheEntryFileW
CreateUrlCacheGroup
InternetAutodialHangup
CreateUrlCacheContainerW
InternetOpenA
advapi32
StartServiceA
CryptSetProviderExW
RegSetValueW
RegFlushKey
RegOpenKeyExA
InitializeSecurityDescriptor
CryptDuplicateHash
CryptGenKey
RegQueryValueW
RevertToSelf
RegRestoreKeyA
LookupPrivilegeValueW
RegCreateKeyA
RegDeleteKeyA
CryptSignHashA
LogonUserW
RegSetKeySecurity
RegLoadKeyA
RegCreateKeyW
RegQueryInfoKeyW
CryptEnumProvidersA
CryptReleaseContext
CryptEnumProvidersW
kernel32
EnterCriticalSection
GetEnvironmentStringsW
TlsFree
FreeLibrary
GetCurrentThread
GetDateFormatA
UnhandledExceptionFilter
VirtualFree
MultiByteToWideChar
TlsGetValue
CloseHandle
WriteFile
GetCurrentThreadId
VirtualQuery
IsValidLocale
RtlUnwind
LCMapStringW
GetStringTypeA
GetCurrentProcess
HeapSize
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
SetConsoleCtrlHandler
GetOEMCP
GetTempFileNameA
CreateFileA
HeapDestroy
GetModuleHandleW
GetLocaleInfoW
GetThreadPriorityBoost
GetACP
HeapAlloc
LeaveCriticalSection
Sleep
GetStdHandle
GlobalDeleteAtom
FlushFileBuffers
VirtualAlloc
HeapReAlloc
GetTimeZoneInformation
RtlMoveMemory
GetProcAddress
SetLastError
CreateMutexA
GetCommandLineA
OpenProcess
GetUserDefaultLCID
GetStartupInfoA
OpenMutexA
GetCPInfo
GetConsoleOutputCP
WritePrivateProfileSectionA
ExitProcess
WriteConsoleW
HeapCreate
SetEnvironmentVariableA
SetHandleCount
InterlockedDecrement
CompareStringA
QueryPerformanceCounter
SetFilePointer
GetFileType
GetUserDefaultLangID
SetUnhandledExceptionFilter
GetEnvironmentStrings
GetConsoleMode
SetConsoleCursorInfo
IsDebuggerPresent
HeapFree
GetModuleFileNameA
GetTimeFormatA
TerminateProcess
GetLastError
EnumSystemLocalesA
GetLocaleInfoA
LCMapStringA
ReadFile
InterlockedIncrement
TlsSetValue
FreeEnvironmentStringsW
InterlockedExchange
OpenFile
DeleteCriticalSection
WriteConsoleA
TlsAlloc
SetStdHandle
WriteFileEx
FreeEnvironmentStringsA
GetConsoleCP
LoadLibraryA
WideCharToMultiByte
GetTickCount
GetCurrentProcessId
EnumCalendarInfoExW
GetSystemTimeAsFileTime
GetDateFormatW
IsValidCodePage
GetStringTypeW
CompareStringW
Sections
.text Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 146KB - Virtual size: 146KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ