Static task
static1
Behavioral task
behavioral1
Sample
fba314a6b9ca56eb92ed072d38c953c5_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
fba314a6b9ca56eb92ed072d38c953c5_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fba314a6b9ca56eb92ed072d38c953c5_JaffaCakes118
-
Size
79KB
-
MD5
fba314a6b9ca56eb92ed072d38c953c5
-
SHA1
348eeb3f83e3fad3f32fdfe85c0e6dd91af48392
-
SHA256
efa6427bd9a1aa7f37fa665cc8de9e03b0e1707eb5d66727d6099d1ba1b9637e
-
SHA512
a6416518e9b025133b27fcc48055eacf709fbbd8e1c33a73076e298376a452355227d242a705faf9139c918cb347ade559ece7639a1949cd96d5b0006d37ca48
-
SSDEEP
1536:clmGTueuAnSGZ3xb+cJOfvx0gmeBIlbQgs25GWGkyTVB4vtJKeUSsLLxx:MmS/bnSGmIEvxseBE+PWjKVLx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fba314a6b9ca56eb92ed072d38c953c5_JaffaCakes118
Files
-
fba314a6b9ca56eb92ed072d38c953c5_JaffaCakes118.exe windows:4 windows x86 arch:x86
20a218181f963b684b31dc875928c08f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetEnvironmentVariableA
EnumSystemCodePagesA
CreateThread
SystemTimeToTzSpecificLocalTime
GetCurrencyFormatW
QueryDosDeviceA
SetLocalTime
ReadFileEx
CopyFileExA
ResetEvent
GetNumberOfConsoleMouseButtons
FindCloseChangeNotification
GetDiskFreeSpaceExA
GlobalSize
GetProcessTimes
FindNextChangeNotification
lstrcmpiA
SetCalendarInfoW
ExpandEnvironmentStringsA
QueryPerformanceCounter
VirtualQuery
CreateDirectoryA
CreateFiber
LoadLibraryExA
IsProcessorFeaturePresent
SetConsoleCursorPosition
VirtualProtect
VerLanguageNameA
GetShortPathNameA
GetCurrentProcessId
GlobalCompact
SearchPathA
GetProfileStringA
GetLogicalDrives
ReadConsoleOutputA
SetCommState
ScrollConsoleScreenBufferA
SetFileApisToANSI
GetThreadPriorityBoost
WinExec
MapViewOfFileEx
CreateSemaphoreW
CreateFileMappingW
EnumTimeFormatsW
ClearCommError
SetEnvironmentVariableA
GetNamedPipeHandleStateA
UnmapViewOfFile
PeekConsoleInputW
HeapFree
VirtualUnlock
GetVersionExW
GetSystemTimeAdjustment
Module32Next
WriteConsoleInputW
GetPrivateProfileSectionNamesW
DisconnectNamedPipe
PeekNamedPipe
VirtualAlloc
OpenFileMappingW
WaitForMultipleObjects
GetFileAttributesExA
WriteFileEx
CreateDirectoryExW
GetCPInfoExW
SetFileTime
GetFileAttributesExW
EnumResourceTypesA
ReadConsoleInputW
GetLocaleInfoW
DebugActiveProcess
GetUserDefaultLangID
GetTimeFormatW
WaitForSingleObject
SignalObjectAndWait
SystemTimeToFileTime
GetCommModemStatus
WaitForSingleObjectEx
CompareStringA
SetCommMask
IsBadStringPtrW
GetNumberOfConsoleInputEvents
GetVolumeInformationW
OpenSemaphoreA
IsBadReadPtr
Thread32Next
CreateSemaphoreA
lstrcmpiW
lstrcatW
GetSystemTimeAsFileTime
SetFileAttributesA
WriteFile
GetPrivateProfileStringW
advapi32
StartServiceW
CryptDuplicateHash
ObjectCloseAuditAlarmW
GetSecurityInfo
EnumDependentServicesW
GetExplicitEntriesFromAclW
StartServiceCtrlDispatcherA
GetPrivateObjectSecurity
CryptDecrypt
CryptContextAddRef
GetSecurityInfoExA
BackupEventLogW
DuplicateTokenEx
RegEnumKeyW
LogonUserW
SetFileSecurityA
IsTextUnicode
LogonUserA
CryptGetDefaultProviderA
GetTrusteeNameA
ConvertSecurityDescriptorToAccessW
ObjectOpenAuditAlarmW
RegConnectRegistryA
CryptDestroyHash
GetSecurityDescriptorControl
GetSecurityDescriptorSacl
RegQueryValueExA
PrivilegedServiceAuditAlarmA
GetEffectiveRightsFromAclW
RegSetValueExW
CryptEnumProviderTypesW
CryptDestroyKey
CryptCreateHash
SetNamedSecurityInfoW
RegQueryInfoKeyW
GetSecurityDescriptorGroup
FreeSid
CopySid
OpenBackupEventLogW
RegUnLoadKeyA
SetServiceObjectSecurity
ObjectPrivilegeAuditAlarmW
GetSidSubAuthority
RegisterServiceCtrlHandlerW
ObjectDeleteAuditAlarmA
GetTrusteeTypeW
GetAce
RegisterEventSourceA
GetNamedSecurityInfoA
FindFirstFreeAce
CryptGetKeyParam
StartServiceA
GetSecurityDescriptorLength
QueryServiceLockStatusW
ConvertSecurityDescriptorToAccessNamedA
RegDeleteKeyW
BuildExplicitAccessWithNameA
GetCurrentHwProfileA
ObjectPrivilegeAuditAlarmA
CryptEnumProvidersA
RegDeleteKeyA
AreAllAccessesGranted
OpenProcessToken
CryptGetDefaultProviderW
AddAuditAccessAce
shlwapi
SHRegOpenUSKeyA
PathFindNextComponentW
PathIsUNCA
StrStrA
PathParseIconLocationA
StrRetToStrW
PathFileExistsW
PathIsSystemFolderA
UrlCompareW
wnsprintfW
SHEnumValueW
PathSkipRootW
SHGetInverseCMAP
StrCSpnA
StrIsIntlEqualA
PathMatchSpecA
PathIsRootW
PathCreateFromUrlA
PathUnquoteSpacesW
UrlCreateFromPathA
PathFileExistsA
PathIsSameRootA
SHRegDuplicateHKey
StrRetToStrA
PathIsDirectoryEmptyW
PathRemoveArgsW
PathIsNetworkPathW
PathUnquoteSpacesA
StrSpnW
StrRStrIW
PathAppendW
PathIsContentTypeA
PathSkipRootA
UrlGetLocationA
SHRegEnumUSValueW
SHCreateStreamOnFileA
StrCSpnW
UrlIsOpaqueA
PathIsSystemFolderW
StrFormatKBSizeA
PathParseIconLocationW
StrCmpNIA
StrCatW
PathGetDriveNumberW
PathFindOnPathA
PathFindNextComponentA
PathGetCharTypeA
StrNCatW
StrRetToBufW
UrlIsOpaqueW
PathFindOnPathW
PathAddBackslashA
SHRegQueryInfoUSKeyW
ColorHLSToRGB
PathRemoveArgsA
wvnsprintfA
StrNCatA
SHDeleteValueA
UrlIsNoHistoryA
SHGetValueA
StrToIntExA
IntlStrEqWorkerA
PathSearchAndQualifyW
StrChrIW
StrCmpIW
SHDeleteEmptyKeyA
UrlUnescapeW
user32
EndDialog
SetForegroundWindow
SendMessageW
WinHelpA
MsgWaitForMultipleObjects
GetComboBoxInfo
EnumPropsW
SetWindowsHookA
DestroyWindow
ChildWindowFromPoint
WINNLSEnableIME
GetMenuStringA
TileWindows
PackDDElParam
EnumPropsExW
DdeDisconnectList
GetKBCodePage
DialogBoxIndirectParamW
SetScrollRange
DdeSetUserHandle
RegisterClassA
CheckMenuRadioItem
GetCaretBlinkTime
PostMessageW
DlgDirSelectComboBoxExA
GetKeyboardLayoutNameA
GetWindowContextHelpId
SetUserObjectInformationA
GetMenuState
DestroyAcceleratorTable
DefDlgProcW
DestroyMenu
ModifyMenuA
DispatchMessageW
RemovePropA
GetQueueStatus
SetFocus
GetSystemMenu
OemToCharA
LoadImageA
IsCharAlphaNumericA
SetClipboardData
ChangeDisplaySettingsA
DdeCreateDataHandle
HiliteMenuItem
GetWindowLongW
RegisterHotKey
GetCapture
GetClipboardSequenceNumber
LoadCursorW
FillRect
MonitorFromRect
CreateDesktopA
SetCursor
FreeDDElParam
UnhookWinEvent
MoveWindow
SetWindowLongA
TrackPopupMenu
PostQuitMessage
ReleaseDC
CreateCursor
ClientToScreen
WaitForInputIdle
CloseClipboard
ShowCaret
CheckMenuItem
SetWindowPos
GetMenuItemRect
SendMessageTimeoutA
TabbedTextOutW
LoadCursorA
GetKeyboardType
CopyAcceleratorTableA
PeekMessageW
GetDoubleClickTime
InSendMessageEx
EndPaint
CreateWindowExA
ScrollDC
CharUpperBuffA
RedrawWindow
SetWindowLongW
IsWindowUnicode
ole32
CoRegisterChannelHook
OleSetContainedObject
CoIsOle1Class
OleSaveToStream
OleLoad
StgCreateDocfile
CoGetCallContext
GetClassFile
ReadClassStg
IsEqualGUID
PropVariantCopy
CLSIDFromProgID
CoFreeUnusedLibraries
OleCreateFromFileEx
CoInitializeEx
CreateObjrefMoniker
UtGetDvtd16Info
CoQueryProxyBlanket
MonikerRelativePathTo
SetConvertStg
CreateItemMoniker
StringFromCLSID
RegisterDragDrop
IsAccelerator
OleGetClipboard
CoRevertToSelf
CoMarshalInterface
CoCreateInstance
CoRegisterMallocSpy
OleIsRunning
OleRegEnumVerbs
OleFlushClipboard
CoQueryReleaseObject
ReadOleStg
OleConvertOLESTREAMToIStorageEx
OleDuplicateData
CoUnmarshalInterface
StgGetIFillLockBytesOnILockBytes
GetHookInterface
StgIsStorageILockBytes
OleInitialize
WriteStringStream
OleNoteObjectVisible
EnableHookObject
WriteFmtUserTypeStg
OleCreate
OleLockRunning
WriteClassStg
ReleaseStgMedium
CoGetInstanceFromIStorage
DllDebugObjectRPCHook
GetConvertStg
CoRegisterPSClsid
OleIsCurrentClipboard
CoTaskMemFree
CoGetCurrentLogicalThreadId
CoUnmarshalHresult
OleLoadFromStream
CoTaskMemRealloc
CoDosDateTimeToFileTime
StgOpenStorageOnILockBytes
OleCreateLinkEx
ReadFmtUserTypeStg
CoFileTimeNow
CoGetCurrentProcess
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE