Static task
static1
Behavioral task
behavioral1
Sample
fb122d7144045cf50ecb976b4a591d69_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fb122d7144045cf50ecb976b4a591d69_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fb122d7144045cf50ecb976b4a591d69_JaffaCakes118
-
Size
222KB
-
MD5
fb122d7144045cf50ecb976b4a591d69
-
SHA1
650da04b8a9b8848e5ea308531e9a6727fb1cf3a
-
SHA256
2c9b1f74187064efb9b66ccc5bc3743dfa2a535ad15a954d71cd782bd784ab3d
-
SHA512
96f7200ad2778e8ba92e818bcdd51c16990f338026ba1dfc0c5e908458e4280dec3b7d05465e49b4d8235b7ab1db3fc78acbc3da218fbcdbdcfc70e7549eb7d8
-
SSDEEP
3072:WoeEH2Rx+H/wKNDjyMkbyUtqHQveAqtPZjRFUDXD3x794xMLSRX49C/Btyq98:kRx+fwKN/ydxemcZlFiDBHLSRCC5tyq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fb122d7144045cf50ecb976b4a591d69_JaffaCakes118
Files
-
fb122d7144045cf50ecb976b4a591d69_JaffaCakes118.exe windows:4 windows x86 arch:x86
5db8f8dbc3fa2edacf3445d9923a557f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
hccutils
LoadSTRING
InitializeKeyHook
FindResources
LoadSTRINGFromHKCU
kernel32
GetProcAddress
GetModuleHandleA
CreateProcessA
FreeLibrary
LoadLibraryA
GetVersionExA
CloseHandle
GetLastError
InterlockedDecrement
SearchPathA
CompareFileTime
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
lstrcmpiA
InterlockedIncrement
GetModuleFileNameA
IsDBCSLeadByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetWindowsDirectoryA
Sleep
CreateMutexA
GetCurrentThreadId
GetCommandLineA
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
FlushFileBuffers
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetStdHandle
WriteFile
HeapCreate
HeapDestroy
ExitProcess
LCMapStringW
LCMapStringA
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetOEMCP
GetCPInfo
GetStartupInfoA
HeapReAlloc
VirtualQuery
GetSystemInfo
VirtualProtect
RtlUnwind
SetFilePointer
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetLastError
IsDebuggerPresent
SetUnhandledExceptionFilter
CreateFileA
UnhandledExceptionFilter
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
TerminateProcess
LocalFree
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetThreadLocale
InterlockedExchange
GetACP
GetLocaleInfoA
user32
GetKeyboardLayout
MapVirtualKeyA
GetKeyNameTextA
LoadCursorA
GetClassInfoExA
SetWindowLongA
RegisterClassA
CreateWindowExA
GetMessageA
DispatchMessageA
PeekMessageA
RegisterClassExA
CreateDialogParamA
ShowWindow
PostQuitMessage
DefWindowProcA
RegisterHotKey
GetDlgItem
GetDesktopWindow
GetWindowRect
SetWindowTextA
SendMessageA
PostThreadMessageA
CharNextA
MessageBoxA
GetCursorPos
GetWindowLongA
EnumDisplaySettingsA
wsprintfA
UnregisterClassA
CallWindowProcA
DestroyWindow
UnregisterHotKey
IsWindow
advapi32
RegSetValueExA
RegQueryInfoKeyA
RegDeleteValueA
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteExA
ole32
CoRevokeClassObject
CoRegisterClassObject
CoCreateInstance
CoTaskMemFree
CoSuspendClassObjects
StringFromGUID2
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysAllocString
SysFreeString
VariantClear
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ