Static task
static1
Behavioral task
behavioral1
Sample
79f216713815e565558c45bcba7db2c5_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
79f216713815e565558c45bcba7db2c5_JaffaCakes118
-
Size
5.1MB
-
MD5
79f216713815e565558c45bcba7db2c5
-
SHA1
97069861de27fb6c977c87879393b9a65e30c63a
-
SHA256
c97ccadfb4b1b46433a9bd095ccab5b8f7be86ee501e660932b32eb736caa7ff
-
SHA512
5933eb698a18dee6f8d2a438227bddd6e210a52b4f0b508c3ba27a0dbdc5b579a49221cea5bf9d46c1458d7f9e39a82a8bbd454699f370ef6388421706d289ec
-
SSDEEP
98304:MXR+ODOJqAKlSuvye+YNpaEVlaKowS4nz0UiE+iRZ/+jqU0obqt9U4ZmcDHMxIo5:PODOJTKXdlcn4z5iEtZGPwO4ZmcDJBJS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 79f216713815e565558c45bcba7db2c5_JaffaCakes118
Files
-
79f216713815e565558c45bcba7db2c5_JaffaCakes118.exe windows:5 windows x86 arch:x86
17c1ee38ba0cc6eb1a34ca2360481bcd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
GetCurrentProcessId
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
GetCurrentDirectoryW
LoadLibraryW
GetProcAddress
GetCurrentProcess
QueryDosDeviceW
CreateToolhelp32Snapshot
Process32FirstW
OpenProcess
TerminateProcess
Process32NextW
GetStartupInfoW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetLogicalDriveStringsW
GetVersion
GetVersionExW
GetSystemDirectoryW
FreeLibrary
WTSGetActiveConsoleSessionId
MultiByteToWideChar
GetDriveTypeW
SleepEx
SystemTimeToFileTime
GetFileInformationByHandle
LocalFileTimeToFileTime
SetFileTime
InterlockedDecrement
InterlockedIncrement
DuplicateHandle
CreateEventW
WaitForMultipleObjects
ResetEvent
QueryPerformanceCounter
FileTimeToSystemTime
RemoveDirectoryA
CreateDirectoryA
DeleteFileA
MoveFileA
SetEndOfFile
FileTimeToLocalFileTime
ReadFile
GetTempPathW
CreateFileA
GetUserDefaultUILanguage
ResumeThread
FormatMessageA
ExpandEnvironmentStringsA
PeekNamedPipe
VerifyVersionInfoW
VerSetConditionMask
SetEnvironmentVariableA
WriteConsoleW
SetStdHandle
GetPrivateProfileStringW
FindFirstFileExW
ReadConsoleW
SetFilePointerEx
GetOEMCP
GetACP
IsValidCodePage
GetConsoleMode
GetConsoleCP
FlushFileBuffers
GetFileSize
RemoveDirectoryW
FindClose
FindNextFileW
FindFirstFileW
SetFileAttributesW
GetTempFileNameW
DeleteFileW
MoveFileExW
WriteFile
CreateFileW
lstrcpynW
CloseHandle
GetCurrentThreadId
GetLocalTime
EnterCriticalSection
SetLastError
GetFileAttributesW
LeaveCriticalSection
WideCharToMultiByte
InitializeCriticalSection
OutputDebugStringW
SetEvent
CreateDirectoryW
UnmapViewOfFile
DeleteCriticalSection
Sleep
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
FindResourceExW
FindResourceW
LoadResource
LockResource
SizeofResource
InterlockedExchange
GetFileType
GetStdHandle
GetTimeZoneInformation
AreFileApisANSI
GetModuleHandleExW
ExitProcess
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
SystemTimeToTzSpecificLocalTime
RtlUnwind
LoadLibraryExW
ExitThread
CreateThread
GetFullPathNameW
IsProcessorFeaturePresent
GetCommandLineW
GetSystemTimeAsFileTime
GetStringTypeW
EncodePointer
IsDebuggerPresent
GetFileAttributesExW
InterlockedCompareExchange
GetTickCount
WritePrivateProfileStringW
GetLastError
GetModuleFileNameW
GetModuleHandleW
SetDllDirectoryW
user32
CreateWindowExW
SetWindowLongW
IsWindow
GetMessageW
TranslateMessage
DispatchMessageW
GetWindowLongW
PostQuitMessage
LoadStringW
CallWindowProcW
SetTimer
DestroyWindow
KillTimer
FindWindowA
SendMessageW
PostMessageW
DefWindowProcW
RegisterWindowMessageW
SendMessageTimeoutW
advapi32
CryptEncrypt
CryptImportKey
CryptHashData
CryptDestroyHash
CryptCreateHash
CryptGetHashParam
RegQueryValueExW
RegOpenKeyW
QueryServiceStatus
OpenServiceW
OpenSCManagerW
CloseServiceHandle
CryptReleaseContext
CryptAcquireContextW
RegCreateKeyExW
RegSetValueExW
RevertToSelf
FreeSid
CheckTokenMembership
AllocateAndInitializeSid
ImpersonateLoggedOnUser
RegCloseKey
RegOpenKeyExW
CryptDestroyKey
shell32
SHChangeNotify
SHCreateDirectoryExW
SHFileOperationW
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoCreateInstance
CoUninitialize
CoInitializeEx
oleaut32
VariantClear
SysAllocString
SysFreeString
shlwapi
PathAppendW
StrCmpNIW
wnsprintfW
PathAddBackslashW
PathFileExistsW
PathIsDirectoryW
wtsapi32
WTSQueryUserToken
psapi
GetProcessImageFileNameW
iphlpapi
GetAdaptersInfo
wininet
HttpSendRequestW
InternetReadFileExA
HttpAddRequestHeadersW
HttpOpenRequestW
InternetConnectW
InternetCrackUrlW
HttpQueryInfoW
InternetOpenW
InternetSetStatusCallbackW
InternetCloseHandle
ws2_32
bind
connect
WSAGetLastError
ntohs
recvfrom
sendto
getsockname
WSASetLastError
select
WSAStartup
setsockopt
ioctlsocket
recv
send
WSACleanup
getsockopt
closesocket
socket
getpeername
gethostname
WSAIoctl
__WSAFDIsSet
accept
listen
freeaddrinfo
getaddrinfo
htons
wldap32
ord133
ord142
ord46
ord301
ord27
ord145
ord14
ord216
ord79
ord26
ord41
ord127
ord118
ord167
ord147
ord208
Sections
.text Size: 750KB - Virtual size: 750KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 189KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ