Static task
static1
Behavioral task
behavioral1
Sample
1fd7a38b452cfcedbe26bee721a659c0_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
1fd7a38b452cfcedbe26bee721a659c0_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
1fd7a38b452cfcedbe26bee721a659c0_JaffaCakes118
-
Size
674KB
-
MD5
1fd7a38b452cfcedbe26bee721a659c0
-
SHA1
73d6f213017b41ccb08929c5d7360c6824c8a1d0
-
SHA256
87c4eb8201f9cf92aa5562d112fdd322a01899bcc38ba39e4f6ef92cbf144900
-
SHA512
9e820462fd627f325e84bf139f85fd2b062d2a235b5f3acf7f073bdd0f1b25faf3982db98ad197f901f29eba596ee3f450d980a2ac897df0dba66a0e9a35be94
-
SSDEEP
12288:qyQ7qF9TJKrWTu3Q5JEVH/ZWiiCi8E4WsmH3HmKCOtK02yh/4G3++Z3vrWTT9b8H:iaTUrWTKQ5iVH/ZWiiCi8EHsmXmKFgGt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1fd7a38b452cfcedbe26bee721a659c0_JaffaCakes118
Files
-
1fd7a38b452cfcedbe26bee721a659c0_JaffaCakes118.exe windows:5 windows x86 arch:x86
9765782dd9eeb90fd0e8f61ea67ecba7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileW
GetDriveTypeW
GenerateConsoleCtrlEvent
CreateMutexW
ReleaseMutex
CreateThread
GetComputerNameW
HeapFree
GetCurrentThreadId
lstrlenA
GetACP
GetFileSizeEx
GetFileAttributesW
GetVersionExW
UnmapViewOfFile
SetFileAttributesW
CreateToolhelp32Snapshot
MultiByteToWideChar
Process32NextW
Process32FirstW
GetNativeSystemInfo
WideCharToMultiByte
CreateFileMappingW
MapViewOfFile
GlobalUnlock
HeapSize
WriteConsoleW
FlushFileBuffers
SetStdHandle
SetEnvironmentVariableA
GetEnvironmentStringsW
IsValidCodePage
FindFirstFileExA
GetTimeZoneInformation
HeapReAlloc
GetConsoleCP
SystemTimeToTzSpecificLocalTime
CopyFileW
CreateProcessW
GetProcessHeap
GetCurrentProcessId
GlobalLock
SetCurrentDirectoryW
FileTimeToLocalFileTime
HeapAlloc
FreeConsole
CloseHandle
GlobalFree
DeleteFileW
GlobalAlloc
GetDiskFreeSpaceExW
FileTimeToSystemTime
AttachConsole
GetLastError
Sleep
OpenProcess
GetSystemDirectoryW
CreateFileW
WaitForSingleObject
FindClose
SetFilePointer
SetErrorMode
CreatePipe
InterlockedDecrement
WriteFile
GetCurrentProcess
FindNextFileW
GetCommandLineW
SetHandleInformation
FindFirstFileW
GetOEMCP
GetVolumeInformationW
SetConsoleCtrlHandler
GetConsoleMode
SetFilePointerEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetFileType
GetCommandLineA
GetStdHandle
GetModuleFileNameA
ExitThread
GetModuleHandleExW
ExitProcess
GetFileAttributesExW
RaiseException
RtlUnwind
LoadLibraryW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
ReleaseSemaphore
VirtualFree
VirtualProtect
ReadFile
FreeEnvironmentStringsW
GetStartupInfoW
VirtualAlloc
LoadLibraryExW
GetModuleHandleA
GetModuleFileNameW
FindNextFileA
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
QueryPerformanceFrequency
QueryPerformanceCounter
TryEnterCriticalSection
DuplicateHandle
WaitForSingleObjectEx
SwitchToThread
GetCurrentThread
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
CreateEventW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetTickCount
GetModuleHandleW
GetProcAddress
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeSListHead
TerminateProcess
LocalFree
CreateTimerQueue
SetEvent
SignalObjectAndWait
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
RegisterWaitForSingleObject
UnregisterWait
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
user32
CloseDesktop
GetUserObjectInformationW
wsprintfW
OpenDesktopW
OpenWindowStationW
SetProcessWindowStation
GetDC
GetProcessWindowStation
GetDesktopWindow
GetThreadDesktop
ReleaseDC
SetThreadDesktop
OpenInputDesktop
CloseWindowStation
gdi32
GetObjectW
SelectPalette
DeleteObject
BitBlt
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
RealizePalette
CreateDCW
GetStockObject
GetDIBits
GetDeviceCaps
DeleteDC
advapi32
AdjustTokenPrivileges
RegQueryValueExW
CreateProcessAsUserW
CryptAcquireContextW
CryptReleaseContext
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegOpenKeyExA
DuplicateTokenEx
LookupAccountSidW
GetTokenInformation
RevertToSelf
ImpersonateLoggedOnUser
GetUserNameW
LookupPrivilegeValueW
CryptGenRandom
RegCloseKey
RegQueryInfoKeyW
RegEnumKeyExW
OpenProcessToken
RegOpenKeyExW
shell32
SHCreateDirectoryExW
SHGetSpecialFolderPathA
ord680
SHGetSpecialFolderPathW
SHGetFolderPathW
ole32
CoInitializeSecurity
CoSetProxyBlanket
CoInitializeEx
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
SysAllocString
VariantClear
ws2_32
connect
gethostname
closesocket
WSAStartup
gethostbyname
htons
inet_ntoa
setsockopt
recv
inet_addr
socket
send
WSAGetLastError
iphlpapi
GetAdaptersInfo
GetTcpTable
shlwapi
PathFileExistsW
wininet
InternetQueryOptionA
Sections
.text Size: 507KB - Virtual size: 506KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ