Static task
static1
Behavioral task
behavioral1
Sample
fac10b9f21df6b9e6df2a0f5e739bedc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fac10b9f21df6b9e6df2a0f5e739bedc_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fac10b9f21df6b9e6df2a0f5e739bedc_JaffaCakes118
-
Size
307KB
-
MD5
fac10b9f21df6b9e6df2a0f5e739bedc
-
SHA1
067f5bfb3b3ab3ec63b7cbc3fa8ddafe5eaedee1
-
SHA256
fe67fea411777df0723df226b9f5655d6626261a2c3a4ac30ea12b35eb086d49
-
SHA512
7fb58d4ab8001b0724c4fe149dee4938d2ca935c582bfa94ee27ded97a43aa2a0c5daad715dc3a7074d555a852e8f7e60129858e14652f49f7b0bb58d47c4e67
-
SSDEEP
6144:pZLpD6vuXu8L9LcCgN5V/d+mInKkzTqHDHC7ojP904Z549LL7l9:nLpVe8pMBImcPqjHC7Mm4w9LH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fac10b9f21df6b9e6df2a0f5e739bedc_JaffaCakes118
Files
-
fac10b9f21df6b9e6df2a0f5e739bedc_JaffaCakes118.exe windows:5 windows x86 arch:x86
f1fcf613477eb0d6bd6e850181d8ddb1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalFree
GetLastError
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
GetTickCount
FindNextFileA
FindFirstFileA
GetComputerNameA
GetModuleFileNameA
GetFileAttributesA
GetDriveTypeA
GetLogicalDriveStringsA
GetSystemPowerStatus
QueryFullProcessImageNameA
GetCurrentProcess
GetProcAddress
LoadLibraryA
WaitForSingleObject
CreateEventA
GetProcessHeap
HeapFree
HeapAlloc
lstrcmpA
OpenProcess
Process32Next
lstrcmpiA
Process32First
CreateToolhelp32Snapshot
Thread32Next
OpenThread
Thread32First
GetWindowsDirectoryA
ExpandEnvironmentStringsA
LocalAlloc
FlushFileBuffers
CreateFileW
WriteConsoleW
SetStdHandle
LoadLibraryW
GetModuleFileNameW
GetConsoleMode
VerSetConditionMask
VerifyVersionInfoW
DeviceIoControl
GetModuleHandleA
CreateFileA
GetCurrentDirectoryA
WriteFile
CloseHandle
Sleep
GetConsoleCP
GetStdHandle
SetFilePointer
ExitProcess
GetStringTypeW
RtlUnwind
EnterCriticalSection
CreateProcessA
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TerminateProcess
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
MultiByteToWideChar
LCMapStringW
WideCharToMultiByte
GetCurrentThreadId
SetLastError
GetModuleHandleW
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
EncodePointer
TlsGetValue
TlsSetValue
DecodePointer
user32
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
KillTimer
GetClassNameA
GetCursorPos
OpenClipboard
EnumWindows
IsClipboardFormatAvailable
CountClipboardFormats
GetSystemMetrics
FindWindowA
MessageBoxA
GetWindowTextA
winspool.drv
EnumPrintersA
advapi32
AdjustTokenPrivileges
GetTokenInformation
OpenProcessToken
LookupPrivilegeValueA
RegQueryValueExA
RegCloseKey
GetUserNameA
RegOpenKeyExA
shell32
SHGetSpecialFolderPathA
SHGetFolderPathA
ole32
CoSetProxyBlanket
CoCreateInstance
CoInitializeEx
CoInitializeSecurity
CoUninitialize
oleaut32
VariantClear
setupapi
SetupDiGetDeviceRegistryPropertyA
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
SetupDiGetClassDevsA
iphlpapi
GetAdaptersInfo
psapi
EnumProcesses
EnumProcessModules
GetModuleBaseNameA
shlwapi
StrStrIA
PathCombineA
winhttp
WinHttpGetDefaultProxyConfiguration
wininet
InternetCheckConnectionA
InternetGetConnectedState
winmm
timeKillEvent
timeSetEvent
timeGetDevCaps
timeEndPeriod
Sections
.text Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 241KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ