Static task
static1
Behavioral task
behavioral1
Sample
f8adc46480501bd6672f32ce87491e5d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f8adc46480501bd6672f32ce87491e5d_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f8adc46480501bd6672f32ce87491e5d_JaffaCakes118
-
Size
276KB
-
MD5
f8adc46480501bd6672f32ce87491e5d
-
SHA1
a9e073bd162e8dd02bed79d9e18e410cf4f7c7f0
-
SHA256
715de76cd8fdbf75b97da35a7cfd7f607c77c11011cb30978f8961d7edb17ed7
-
SHA512
72315334c341f2120420296f5547065778fd321ca166cea7bd808a8c32bc7640de45060b551097b7e30446543dbd7d43f27115ad24264251ff97d83f7606ded7
-
SSDEEP
6144:vRliC72jJbnZE9+24jLrzvSePhdT6K3j:Jld72jJbZJ2KfvNdT3j
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f8adc46480501bd6672f32ce87491e5d_JaffaCakes118
Files
-
f8adc46480501bd6672f32ce87491e5d_JaffaCakes118.exe windows:4 windows x86 arch:x86
f537ae4c806d1a52421584eff3f82c97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpyA
InitializeCriticalSection
ResumeThread
SearchPathA
CreateTimerQueue
SetNamedPipeHandleState
GetModuleFileNameW
OpenFileMappingA
FileTimeToDosDateTime
GetSystemWindowsDirectoryW
LocalUnlock
CompareStringA
CreateFileMappingW
lstrcmpA
HeapAlloc
GlobalFree
QueryDosDeviceA
MulDiv
SetEnvironmentVariableA
HeapSize
GetCPInfo
GlobalAddAtomA
GetVolumeInformationW
GetUserDefaultUILanguage
UnlockFile
SetFileAttributesW
GetComputerNameW
MoveFileW
GlobalFlags
GetStdHandle
LocalLock
IsDBCSLeadByte
GetDateFormatA
ExitProcess
GetPrivateProfileIntW
MoveFileExW
GetModuleHandleA
GetCommandLineA
TerminateProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsW
DebugBreak
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsSetValue
TlsAlloc
SetLastError
GetLastError
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
EnterCriticalSection
LeaveCriticalSection
GetACP
GetOEMCP
HeapReAlloc
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
InterlockedDecrement
InterlockedIncrement
GlobalMemoryStatus
GetExitCodeThread
GetVersionExA
CreateFileW
FreeEnvironmentStringsA
SetEnvironmentVariableW
GlobalUnlock
GetWindowsDirectoryW
GetTempPathA
GetWindowsDirectoryA
SetFilePointerEx
GetSystemDirectoryA
GetStringTypeExA
EnumCalendarInfoA
FindNextFileA
SetUnhandledExceptionFilter
GlobalGetAtomNameA
SetFilePointer
GetPrivateProfileSectionA
GetFullPathNameW
Beep
InitializeCriticalSectionAndSpinCount
CreateToolhelp32Snapshot
GetStringTypeExW
OpenFile
GetCurrentThreadId
UnmapViewOfFile
MoveFileExA
GetTimeFormatA
CreateEventW
GetStartupInfoA
OpenEventW
GetVersion
GetPriorityClass
WaitForSingleObject
GetLocalTime
CreateTimerQueueTimer
CreateMutexW
GetFileSizeEx
GetCurrentDirectoryW
FindFirstFileA
GetComputerNameA
TlsGetValue
AddAtomA
GetTempFileNameA
FormatMessageA
DeleteTimerQueueEx
GetCurrentProcess
GetDiskFreeSpaceW
GetEnvironmentStrings
lstrlenA
WideCharToMultiByte
VirtualAlloc
version
VerQueryValueA
user32
CreateAcceleratorTableW
GetMenuItemInfoW
ExitWindowsEx
DestroyWindow
CharNextA
TrackMouseEvent
MessageBoxIndirectW
RegisterClipboardFormatA
CharPrevA
DrawTextW
GetAncestor
GetMessageA
GetWindowRgn
EnumThreadWindows
GetIconInfo
EnableWindow
GetPropW
GetCapture
SetClipboardData
DrawTextA
GetLastActivePopup
CharToOemBuffA
IsWindow
IsWindowUnicode
SetWindowRgn
SystemParametersInfoW
LoadBitmapA
DrawStateW
TranslateAcceleratorW
shell32
Shell_NotifyIconA
ole32
CoCreateInstance
CoRegisterClassObject
OleFlushClipboard
CoTreatAsClass
OleSetClipboard
OleGetClipboard
GetHGlobalFromStream
OleDuplicateData
CoFreeUnusedLibraries
OleCreateFromFile
comctl32
PropertySheetA
ImageList_DragLeave
ImageList_SetIconSize
gdi32
GetWindowOrgEx
DPtoLP
ExtEscape
InvertRgn
RestoreDC
CopyMetaFileA
Arc
GetEnhMetaFileBits
GetTextExtentPoint32A
ScaleWindowExtEx
BitBlt
SetEnhMetaFileBits
GetSystemPaletteEntries
LineTo
Chord
SetDIBits
SetWindowExtEx
CreateFontA
SetRectRgn
CreateSolidBrush
RectInRegion
GetPaletteEntries
CreateBrushIndirect
CreatePen
ExtCreatePen
CreateEllipticRgn
CreateICW
GetWinMetaFileBits
advapi32
GetSecurityInfo
LookupAccountSidW
ConvertSidToStringSidA
RegEnumValueA
RegDeleteValueA
QueryServiceConfigA
ImpersonateLoggedOnUser
EqualSid
CryptDestroyHash
RegCreateKeyW
OpenThreadToken
RegDeleteKeyA
ReportEventW
QueryServiceConfigW
DeleteService
GetSecurityDescriptorDacl
IsValidSid
AllocateAndInitializeSid
GetSecurityDescriptorControl
oleaut32
SysFreeString
shlwapi
PathGetDriveNumberW
comdlg32
GetSaveFileNameA
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ