Static task
static1
Behavioral task
behavioral1
Sample
fc83605126a233786f6daadefed7985b_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fc83605126a233786f6daadefed7985b_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
fc83605126a233786f6daadefed7985b_JaffaCakes118
-
Size
188KB
-
MD5
fc83605126a233786f6daadefed7985b
-
SHA1
1e840fe00513276b656e3132fce5448e8f3ab498
-
SHA256
e746291259d96aa8789bea5e2fef56a7773690f5910562bc28aeafcd6b9fe756
-
SHA512
5aea61d7391b81b525cd75f7be655cba7a1e029c12fcaa8480548ee82db695c875903724994eb6461ddaeff5a03c95eceb2684181cba7a3acf85f2d47eb5bd91
-
SSDEEP
3072:IA6uJSOJm+fbnD2p6w6xFiowrTM4zVP3NjTOy:IAAOJm+zD3bFHQTM4hP3hO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fc83605126a233786f6daadefed7985b_JaffaCakes118
Files
-
fc83605126a233786f6daadefed7985b_JaffaCakes118.exe windows:4 windows x86 arch:x86
c2d873b83191d53c7bc3038d8691788d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEvent
HeapFree
HeapAlloc
GetProcessHeap
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
GetTickCount
GetStartupInfoA
CreatePipe
DisconnectNamedPipe
TerminateProcess
PeekNamedPipe
GetLocalTime
GetSystemInfo
GetVersionExA
OpenEventA
SetErrorMode
LocalSize
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
lstrcmpiA
GetCurrentThreadId
GetModuleHandleA
GetSystemDirectoryA
ExitProcess
GetWindowsDirectoryA
TerminateThread
CreateThread
GetCurrentProcess
SetLastError
GetModuleFileNameA
WriteFile
SetFilePointer
ReadFile
CreateFileA
GetFileSize
CloseHandle
RemoveDirectoryA
LocalAlloc
FindFirstFileA
LocalReAlloc
FindNextFileA
LocalFree
FindClose
GetLogicalDriveStringsA
GetVolumeInformationA
GetDiskFreeSpaceExA
GetDriveTypeA
lstrcatA
CreateProcessA
lstrlenA
GetFileAttributesA
CreateDirectoryA
GetLastError
DeleteFileA
CancelIo
InterlockedExchange
lstrcpyA
ResetEvent
WaitForSingleObject
InitializeCriticalSection
Sleep
CreateEventA
VirtualAlloc
LoadLibraryA
GetProcAddress
EnterCriticalSection
LeaveCriticalSection
VirtualFree
DeleteCriticalSection
WaitForMultipleObjects
user32
SetClipboardData
EmptyClipboard
OpenClipboard
GetClipboardData
LoadCursorA
BlockInput
SendMessageA
SystemParametersInfoA
ReleaseDC
GetDC
GetDesktopWindow
CloseClipboard
GetCursorPos
WindowFromPoint
OpenWindowStationA
GetProcessWindowStation
ExitWindowsEx
GetWindowThreadProcessId
IsWindowVisible
EnumWindows
CloseDesktop
SetThreadDesktop
OpenInputDesktop
GetUserObjectInformationA
SetRect
SetCursorPos
IsWindow
CharNextA
SetCapture
mouse_event
MapVirtualKeyA
GetKeyState
wsprintfA
GetAsyncKeyState
SetProcessWindowStation
GetWindowTextA
GetForegroundWindow
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
GetThreadDesktop
gdi32
GetDIBits
CreateCompatibleDC
BitBlt
SelectObject
DeleteDC
CreateCompatibleBitmap
DeleteObject
CreateDIBSection
advapi32
RegQueryValueA
GetTokenInformation
LookupAccountSidA
RegDeleteKeyA
RegDeleteValueA
RegEnumKeyExA
RegEnumValueA
AllocateAndInitializeSid
RegCloseKey
RegOpenKeyExA
CloseServiceHandle
DeleteService
ControlService
QueryServiceStatus
OpenServiceA
OpenSCManagerA
RegSetValueExA
RegCreateKeyA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
RegCreateKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
shell32
SHGetFileInfoA
msvcrt
_strnicmp
strncat
_onexit
__dllonexit
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_beginthreadex
_strupr
strtok
_errno
strchr
atoi
strncmp
strcat
rename
strcmp
strrchr
_except_handler3
malloc
strcpy
free
memcmp
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy
memmove
__CxxFrameHandler
_CxxThrowException
ceil
_ftol
strlen
strstr
memset
shlwapi
SHDeleteKeyA
ws2_32
accept
listen
WSACleanup
sendto
recvfrom
__WSAFDIsSet
gethostname
getpeername
bind
getsockname
inet_addr
inet_ntoa
send
select
closesocket
recv
ntohs
socket
gethostbyname
connect
setsockopt
WSAStartup
WSAIoctl
htons
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
avicap32
capGetDriverDescriptionA
capCreateCaptureWindowA
msvfw32
ICSeqCompressFrameEnd
ICSendMessage
psapi
GetModuleFileNameExA
EnumProcessModules
wtsapi32
WTSFreeMemory
WTSQuerySessionInformationA
Sections
.text Size: 120KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ