Static task
static1
Behavioral task
behavioral1
Sample
90b3f446fce9d0129110d43608198b3c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
90b3f446fce9d0129110d43608198b3c_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
90b3f446fce9d0129110d43608198b3c_JaffaCakes118
-
Size
875KB
-
MD5
90b3f446fce9d0129110d43608198b3c
-
SHA1
337c316f9d02d42a14322e4b9efd715077db16c3
-
SHA256
b58d6d532ad670a54343ea1b7eeddc7492ab71c6c2d2e9fb09b35c64d703655a
-
SHA512
d9bed603af42c09cf447b75a49b7d2ed4e1b49fcf8c39886d007e52a35cc2b9424c2eb3309a7f067ccc48c417610b7dd966f3b978e41c9bc8791c233765eef07
-
SSDEEP
24576:rnAFKnNETqCYzWN2OOY8X/EzGPL+rM/FN7FiPKg2IVv8Y6Q7I9:z9ETzYzm2jJszxAFN7FiPKg2IVv8Y6Qs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 90b3f446fce9d0129110d43608198b3c_JaffaCakes118
Files
-
90b3f446fce9d0129110d43608198b3c_JaffaCakes118.exe windows:5 windows x86 arch:x86
b98b2db0943703b6cccaa25df7d674ed
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
user32
EnumPropsExA
GetKeyState
CharUpperW
GetSysColor
SetDlgItemInt
DdeFreeDataHandle
GetDlgCtrlID
SetClipboardData
CreateDialogIndirectParamA
RegisterDeviceNotificationW
LookupIconIdFromDirectoryEx
PostThreadMessageW
GetMessageW
RedrawWindow
SendMessageW
MapVirtualKeyW
SetScrollInfo
GetCapture
SendInput
GetWindowTextLengthA
RemovePropA
GetMenuItemRect
DestroyMenu
InsertMenuW
EnableWindow
IsWinEventHookInstalled
TranslateMDISysAccel
GetDlgItemTextW
mscms
InternalGetPS2ColorRenderingDictionary
EnumColorProfilesA
GetStandardColorSpaceProfileW
OpenColorProfileW
GetColorProfileHeader
CheckBitmapBits
CloseColorProfile
GetColorProfileElement
IsColorProfileValid
OpenColorProfileA
InternalGetPS2PreviewCRD
TranslateBitmapBits
DeleteColorTransform
GetColorDirectoryA
GetColorDirectoryW
UninstallColorProfileW
InstallColorProfileW
CreateColorTransformW
InternalGetPS2ColorSpaceArray
CreateColorTransformA
InternalGetPS2CSAFromLCS
EnumColorProfilesW
TranslateColors
dbghelp
ImageNtHeader
EnumerateLoadedModules
SymUnloadModule64
SymLoadModule64
SymCleanup
SymRegisterCallback64
ImageDirectoryEntryToDataEx
ImageRvaToVa
SymInitialize
ImageDirectoryEntryToData
SymSetOptions
MakeSureDirectoryPathExists
rpcrt4
NdrCStdStubBuffer_Release
RpcSsDestroyClientContext
RpcBindingSetOption
RpcStringBindingComposeW
RpcServerRegisterIfEx
UuidCompare
RpcBindingFromStringBindingA
RpcAsyncGetCallStatus
I_RpcBindingIsClientLocal
NdrGetUserMarshalInfo
RpcRevertToSelf
RpcServerUnregisterIf
UuidFromStringA
RpcEpResolveBinding
RpcMgmtSetComTimeout
RpcMgmtEnableIdleCleanup
RpcSmDestroyClientContext
RpcStringFreeW
UuidCreateSequential
RpcServerRegisterIf
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegLoadKeyA
CreateServiceA
OpenEncryptedFileRawW
LsaCreateTrustedDomainEx
EqualSid
SetServiceObjectSecurity
ImpersonateLoggedOnUser
OpenServiceA
TraceEvent
CreateServiceW
ControlService
CryptAcquireContextA
DeleteAce
LsaStorePrivateData
LsaICLookupNames
CryptGenRandom
CryptVerifySignatureW
StopTraceW
AdjustTokenPrivileges
LsaGetSystemAccessAccount
DuplicateToken
LsaLookupNames
SetTokenInformation
AbortSystemShutdownA
OpenEventLogA
LsaQueryTrustedDomainInfoByName
SetKernelObjectSecurity
RevertToSelf
CryptDestroyKey
OpenTraceW
RegNotifyChangeKeyValue
WriteEncryptedFileRaw
CryptGenKey
RegLoadKeyW
SetSecurityInfo
ChangeServiceConfigA
LsaCreateAccount
RegRestoreKeyW
SystemFunction007
GetUserNameA
CryptDeriveKey
LsaGetUserName
RegReplaceKeyA
InitializeAcl
AreAllAccessesGranted
RegDeleteKeyW
QueryServiceConfigA
odbc32
CursorLibTransact
PostODBCError
SearchStatusCode
CursorLibLockDesc
VRetrieveDriverErrorsRowCol
CursorLibLockDbc
SQLTablesA
CursorLibLockStmt
PostODBCComponentError
LockHandle
VFreeErrors
ValidateErrorQueue
kernel32
_hread
SetLocaleInfoA
DebugBreak
GetBinaryType
ReadDirectoryChangesW
HeapSetInformation
GetFullPathNameA
SetConsoleOS2OemFormat
MoveFileWithProgressW
WaitForSingleObject
VirtualProtect
GetDiskFreeSpaceW
GlobalFindAtomW
GetUserDefaultUILanguage
GetCompressedFileSizeW
VirtualAlloc
SetMailslotInfo
OpenThread
CreateIoCompletionPort
GetNamedPipeInfo
GetNextVDMCommand
Sections
.pdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ldata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.code Size: 86KB - Virtual size: 408KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 132KB - Virtual size: 243KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.edata Size: 297KB - Virtual size: 326KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 125KB - Virtual size: 254KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 133KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 918B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ