Static task
static1
Behavioral task
behavioral1
Sample
fff11b79e91a6b0bbc1b7cf9243ee0d5_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
fff11b79e91a6b0bbc1b7cf9243ee0d5_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fff11b79e91a6b0bbc1b7cf9243ee0d5_JaffaCakes118
-
Size
171KB
-
MD5
fff11b79e91a6b0bbc1b7cf9243ee0d5
-
SHA1
621dcbec53983b3015156311dffe4105fa41957b
-
SHA256
5e70995e45e1b6777586d563bd2e7b2ac32fbe3d31abfe112f324c5e6494a169
-
SHA512
4cd3144d39f2459d697b3d34a0d4b9892d76928656dc223f3dd86efee4e7a95f4c551bd736d4e4372298d034a34e671702881ef78c2897ad22015c8179fc31a0
-
SSDEEP
3072:Rsxn16lIyV7X32zQ9kaa9s9SuKZQzr5pvy49aNq2KAgAmYtetNM5:iB16x19kaa9uGQv5ZyxwAlmYtew
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fff11b79e91a6b0bbc1b7cf9243ee0d5_JaffaCakes118
Files
-
fff11b79e91a6b0bbc1b7cf9243ee0d5_JaffaCakes118.exe windows:2 windows x86 arch:x86
d20667b3b12002bd36625fb44c27901c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetHandleCount
OutputDebugStringA
LZSeek
GlobalUnlock
GetVDMCurrentDirectories
VerSetConditionMask
GetCommandLineW
GetEnvironmentStringsW
GetACP
BuildCommDCBA
VirtualAlloc
LoadResource
SetWaitableTimer
GlobalFree
GetModuleHandleA
SetFilePointer
GetFileInformationByHandle
GetGeoInfoW
FreeEnvironmentStringsA
SetLastError
TlsSetValue
GetModuleHandleA
CloseHandle
FindResourceExW
LCMapStringW
GetCurrentProcess
SetConsoleNlsMode
TerminateProcess
RequestWakeupLatency
FindResourceA
SetEndOfFile
GetSystemInfo
_llseek
GetTimeZoneInformation
WritePrivateProfileStructA
CompareStringA
_lread
GlobalSize
MultiByteToWideChar
MoveFileWithProgressA
HeapSize
HeapFree
EnterCriticalSection
DeleteCriticalSection
GetStdHandle
GetBinaryTypeA
GetStringTypeA
ReplaceFileA
SetEnvironmentVariableA
InterlockedDecrement
GlobalAddAtomW
GetStartupInfoW
ExitProcess
LocalFileTimeToFileTime
GlobalAlloc
LoadModule
CompareStringW
LocalFree
SetConsoleCursorMode
RtlUnwind
GetConsoleAliasExesA
HeapDestroy
WideCharToMultiByte
GetCPInfo
WaitForSingleObject
CloseProfileUserMapping
HeapAlloc
GetStringTypeA
GetLocalTime
HeapCreate
MulDiv
GetCurrentActCtx
FindFirstFileA
FlushFileBuffers
GetStartupInfoA
GetVersion
IsValidCodePage
CancelTimerQueueTimer
VirtualFree
DeleteFileA
GetOEMCP
OpenWaitableTimerW
SetSystemPowerState
InitializeSListHead
InterlockedIncrement
SetStdHandle
_lwrite
GetStringTypeW
EnumSystemCodePagesW
GetPrivateProfileIntW
HeapReAlloc
GetCommandLineA
GetFileType
DeleteTimerQueueTimer
LCMapStringA
DeleteTimerQueueEx
LeaveCriticalSection
GetFullPathNameW
GlobalFlags
FreeEnvironmentStringsW
LockResource
BeginUpdateResourceW
_lclose
GlobalReAlloc
DeleteFileA
GlobalHandle
GetLastError
GlobalLock
TlsAlloc
user32
DefMDIChildProcA
GetWindowLongW
IMPGetIMEW
GetListBoxInfo
SetWindowPlacement
SetThreadDesktop
IMPQueryIMEW
GetClipboardViewer
LoadBitmapA
LoadMenuW
FreeDDElParam
SetUserObjectSecurity
UnhookWindowsHook
CreateDialogParamW
UserLpkTabbedTextOut
WINNLSGetIMEHotkey
SetWindowLongW
DrawFrame
GetCursorPos
CharToOemW
HideCaret
MapVirtualKeyExW
EnumWindowStationsW
SystemParametersInfoA
UpdatePerUserSystemParameters
SetWindowStationUser
CreateAcceleratorTableW
IMPSetIMEA
IsDialogMessage
ModifyMenuW
CreateMDIWindowA
ChangeMenuW
CreateIconFromResource
ChangeDisplaySettingsW
OemToCharW
DdeSetUserHandle
SetDlgItemTextW
IsWindowUnicode
GetClassWord
GetScrollBarInfo
GetMenuItemCount
GetInputDesktop
SetShellWindow
GetDlgItemInt
wsprintfA
ShowScrollBar
SetDeskWallpaper
DeviceEventWorker
EnumDisplaySettingsExA
DlgDirSelectComboBoxExW
CharUpperW
SetScrollRange
DdeQueryNextServer
EndDeferWindowPos
oledlg
OleUIUpdateLinksA
OleUIPasteSpecialW
OleUIInsertObjectW
Sections
.SeOoMY Size: 1024B - Virtual size: 657B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.E Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TrAM Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.LCZ Size: 1024B - Virtual size: 657B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MNQj Size: 1024B - Virtual size: 601B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Hn Size: 2KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 15KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.GFSJ Size: 1KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.nnKkmY Size: 2KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ