Static task
static1
Behavioral task
behavioral1
Sample
ff7f1123640d01eface27f5341443976_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ff7f1123640d01eface27f5341443976_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
ff7f1123640d01eface27f5341443976_JaffaCakes118
-
Size
186KB
-
MD5
ff7f1123640d01eface27f5341443976
-
SHA1
20f05e83c35a0bf0048884c776ab83709b6938dc
-
SHA256
29a3f02adf79319afd53292bb21801c184a206058d271375bf2e7683d782563e
-
SHA512
b9a4135b6fdf0271503bad9efadeb794746569c15135ce9958095cdbb49c6e4f4cc1daee94dc9ab37083f11b36f0cdc2d813c8d8254c47de7f95d26d5726393b
-
SSDEEP
3072:UU6AMDUTvlImPxPS6Qmn1lNq6g+SmZ82H:w1ouqxPS6Qmn1lNq6g+SmZ3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff7f1123640d01eface27f5341443976_JaffaCakes118
Files
-
ff7f1123640d01eface27f5341443976_JaffaCakes118.exe windows:1 windows x86 arch:x86
d4330f00c16ff578bde9a1b87c61599b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegSetValueExA
AllocateAndInitializeSid
OpenThreadToken
CloseServiceHandle
RegQueryInfoKeyW
GetLengthSid
RegQueryValueExA
RegOpenKeyW
OpenProcessToken
RegOpenKeyExA
OpenProcessToken
RegDeleteKeyW
GetLengthSid
InitializeAcl
RegOpenKeyExA
AllocateAndInitializeSid
RegSetValueExA
RegCreateKeyExA
InitializeSecurityDescriptor
GetTokenInformation
GetTokenInformation
CloseServiceHandle
InitializeAcl
CloseServiceHandle
GetTokenInformation
RegDeleteKeyW
RegSetValueExW
RegQueryValueExW
AdjustTokenPrivileges
OpenProcessToken
AddAccessAllowedAce
RegCreateKeyExW
OpenProcessToken
FreeSid
RegDeleteValueW
RegDeleteValueW
RegOpenKeyExW
RegDeleteValueW
RegQueryValueExW
RegEnumValueW
AddAccessAllowedAce
GetLengthSid
OpenProcessToken
AddAccessAllowedAce
OpenThreadToken
FreeSid
RegDeleteValueW
SetSecurityDescriptorDacl
OpenThreadToken
InitializeSecurityDescriptor
RegDeleteValueW
RegCreateKeyExW
RegOpenKeyExA
RegCreateKeyExW
FreeSid
RegSetValueExW
OpenProcessToken
AdjustTokenPrivileges
RegQueryValueExA
RegCreateKeyExW
RegOpenKeyExW
RegCreateKeyExA
InitializeSecurityDescriptor
GetLengthSid
OpenThreadToken
RegQueryValueExA
RegCloseKey
RegQueryValueExW
RegOpenKeyExA
RegQueryValueExW
RegDeleteKeyW
RegCreateKeyExA
RegQueryValueExW
CloseServiceHandle
AdjustTokenPrivileges
RegDeleteValueW
FreeSid
RegCreateKeyExA
RegSetValueExA
RegEnumKeyExW
RegOpenKeyW
RegDeleteValueW
FreeSid
SetSecurityDescriptorDacl
RegQueryInfoKeyW
RegEnumValueW
FreeSid
AllocateAndInitializeSid
AdjustTokenPrivileges
RegCreateKeyExA
RegCloseKey
RegEnumValueW
RegQueryValueExW
RegSetValueExA
RegQueryValueExW
RegCreateKeyExW
RegDeleteKeyW
RegCloseKey
RegQueryValueExA
RegCreateKeyExW
CloseServiceHandle
InitializeAcl
RegSetValueExW
AdjustTokenPrivileges
SetSecurityDescriptorDacl
RegEnumKeyExW
RegDeleteValueW
InitializeSecurityDescriptor
OpenThreadToken
GetTokenInformation
RegOpenKeyExA
RegOpenKeyExW
SetSecurityDescriptorDacl
RegSetValueExW
AddAccessAllowedAce
RegCreateKeyExW
FreeSid
RegDeleteKeyW
GetLengthSid
RegEnumKeyExW
RegQueryValueExW
AdjustTokenPrivileges
RegEnumValueW
RegSetValueExA
CloseServiceHandle
CloseServiceHandle
RegEnumValueW
RegCloseKey
RegSetValueExW
RegSetValueExA
RegOpenKeyW
RegCreateKeyExA
RegQueryInfoKeyW
FreeSid
SetSecurityDescriptorDacl
RegCreateKeyExW
GetLengthSid
RegOpenKeyExW
user32
SystemParametersInfoW
CharNextW
MessageBeep
EnableMenuItem
GetSystemMetrics
KillTimer
DialogBoxParamW
IsWindowVisible
EnableMenuItem
IsWindowVisible
LoadStringW
IsWindowVisible
DestroyMenu
CopyRect
GetSysColor
FindWindowW
DestroyWindow
SetWindowLongW
EndPaint
UpdateWindow
PeekMessageW
CallWindowProcW
WinHelpW
GetWindow
SendMessageW
SetTimer
GetParent
DialogBoxParamW
CopyRect
GetWindowRect
GetWindowRect
GetWindowLongW
wsprintfW
KillTimer
EnableWindow
EndPaint
CreateDialogParamW
SetCursor
PeekMessageW
OffsetRect
EndDialog
GetSubMenu
LoadStringW
wsprintfA
GetWindowTextW
EndDialog
UpdateWindow
DestroyIcon
GetFocus
SystemParametersInfoW
KillTimer
GetDC
CheckDlgButton
MessageBoxW
GetDlgItem
OffsetRect
GetMenu
GetCursorPos
GetSystemMetrics
UpdateWindow
MoveWindow
GetKeyState
GetMenu
kernel32
InterlockedIncrement
GetModuleFileNameA
LeaveCriticalSection
CloseHandle
ExitProcess
GetVersionExA
GetModuleHandleW
SetLastError
LoadLibraryW
GetACP
SetUnhandledExceptionFilter
GetCurrentProcess
ReadFile
TerminateProcess
lstrlenW
WaitForSingleObject
WideCharToMultiByte
GetCurrentProcess
GetACP
HeapFree
MultiByteToWideChar
GetCommandLineW
QueryPerformanceCounter
GetCurrentProcessId
LoadLibraryW
HeapAlloc
TerminateProcess
Sections
Size: 141KB - Virtual size: 156KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 512B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE