Static task
static1
Behavioral task
behavioral1
Sample
a2ac4653b43d27e718503105b7f77ae2_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
a2ac4653b43d27e718503105b7f77ae2_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
a2ac4653b43d27e718503105b7f77ae2_JaffaCakes118
-
Size
822KB
-
MD5
a2ac4653b43d27e718503105b7f77ae2
-
SHA1
e62d872134a2c12c74584f19f3c0c8c3aa444ef9
-
SHA256
a36d7fd14f83f6d301ecaa87d7d77ee2c0577723adae1f6f033c47c21a609b8c
-
SHA512
4e79039637bc8fe2d82733d35d4ca02e2f370efe9c2dfb18fd230020b115b43d2f163075994525791f899ec3872ac75f32caafba83ffa2751420ffefee88f15a
-
SSDEEP
12288:v3WBZzm8mjP6z9zq5E0TNCMujius2gHHS6QWTjbnmsRS9JuB:/WrzmizZq5EnMuR6QWTjbmeB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2ac4653b43d27e718503105b7f77ae2_JaffaCakes118
Files
-
a2ac4653b43d27e718503105b7f77ae2_JaffaCakes118.exe windows:5 windows x86 arch:x86
ccb125a88ca0941602054c5a155111c5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ResetWriteWatch
GetPrivateProfileIntW
SetSystemPowerState
CreateNamedPipeA
FindFirstFileA
CreateSemaphoreW
Toolhelp32ReadProcessMemory
ReadFile
GetFileSize
SetVolumeMountPointA
FindResourceExA
SetMailslotInfo
SetEndOfFile
FreeEnvironmentStringsA
Module32FirstW
CreateJobObjectA
GetFileType
GetDateFormatA
FlushConsoleInputBuffer
GetFileSizeEx
CreateHardLinkW
SetEnvironmentVariableA
CreateNamedPipeW
SetConsoleOutputCP
SetConsoleCtrlHandler
SetFileAttributesA
ExpandEnvironmentStringsW
SetProcessWorkingSetSize
GetPriorityClass
GetFullPathNameW
FoldStringW
SetTapeParameters
OpenThread
GetProcessTimes
ReplaceFileW
GetLongPathNameA
GetUserDefaultLCID
FreeConsole
GetCurrencyFormatW
CreateWaitableTimerW
Module32NextW
FindAtomA
SetComputerNameExW
SetLocaleInfoA
GetNumberOfConsoleInputEvents
GetStringTypeExA
GetConsoleOutputCP
GetDiskFreeSpaceExW
GetSystemDirectoryA
OpenWaitableTimerW
GetVersion
GetTempPathA
GetShortPathNameW
MoveFileWithProgressW
SetThreadLocale
GetLogicalDriveStringsW
CopyFileA
SetThreadExecutionState
GetHandleInformation
MapViewOfFileEx
GetModuleFileNameA
GetAtomNameA
CreateEventA
DnsHostnameToComputerNameW
GetCPInfoExW
FindVolumeMountPointClose
LCMapStringA
GetConsoleAliasW
GetProfileSectionW
AssignProcessToJobObject
GetPrivateProfileStringW
SetConsoleDisplayMode
Module32First
GetThreadPriority
GetSystemDefaultLangID
CopyFileExW
GetProfileIntA
GetModuleHandleA
FlushFileBuffers
SetUnhandledExceptionFilter
SetHandleInformation
DeviceIoControl
GetACP
GetStringTypeW
GetConsoleAliasesW
SetConsoleActiveScreenBuffer
GetDiskFreeSpaceExA
ReadProcessMemory
FlushInstructionCache
GetPrivateProfileStructW
CreateTapePartition
OpenFileMappingA
EnumCalendarInfoW
DuplicateHandle
OpenJobObjectA
MapUserPhysicalPagesScatter
GetProfileStringA
GetStringTypeExW
GetProcAddress
SetCalendarInfoW
GetStringTypeA
EraseTape
GetModuleHandleW
FormatMessageW
SetErrorMode
SetThreadContext
GetCPInfoExA
GetPrivateProfileSectionNamesW
FindFirstVolumeMountPointA
CreateTimerQueue
FindResourceExW
GetVolumePathNameA
GetPrivateProfileStringA
GetNamedPipeHandleStateW
GetProcessPriorityBoost
FindAtomW
GetTapeStatus
FlushViewOfFile
SetSystemTimeAdjustment
ExpandEnvironmentStringsA
GetProcessWorkingSetSize
FindFirstVolumeA
DeleteTimerQueue
CreateToolhelp32Snapshot
GetShortPathNameA
SetNamedPipeHandleState
GetDiskFreeSpaceW
SetStdHandle
GetVolumeNameForVolumeMountPointA
GetDiskFreeSpaceA
GetConsoleAliasExesLengthA
PeekNamedPipe
ReplaceFileA
SearchPathA
SetWaitableTimer
SetConsoleMode
GetCompressedFileSizeW
GetConsoleAliasExesLengthW
GetThreadContext
CreateFileMappingW
GetAtomNameW
FindNextChangeNotification
GetFileAttributesW
ContinueDebugEvent
CopyFileExA
ConvertDefaultLocale
Module32Next
GetNumberFormatW
GetEnvironmentVariableA
CreateMutexW
GetFileAttributesExA
SetPriorityClass
CompareStringA
GetPrivateProfileIntA
CreateSemaphoreA
GetVolumePathNameW
GetVolumeInformationA
OpenMutexA
CreateDirectoryW
CreateDirectoryA
GetOEMCP
CompareStringW
GetBinaryTypeA
CreateJobObjectW
SetComputerNameExA
FreeEnvironmentStringsW
SetProcessAffinityMask
CancelIo
GetLongPathNameW
OpenSemaphoreW
GetTempPathW
GetConsoleAliasExesA
AddAtomW
GetCurrentProcess
ReadDirectoryChangesW
SetThreadIdealProcessor
GetTimeFormatW
ConvertThreadToFiber
GetUserDefaultUILanguage
GetLogicalDriveStringsA
GetEnvironmentStrings
CreateEventW
FindVolumeClose
DeleteTimerQueueTimer
GetWindowsDirectoryA
FormatMessageA
GetNamedPipeHandleStateA
GetSystemWindowsDirectoryA
OpenMutexW
FindResourceW
OpenProcess
SetFileTime
GetNumberFormatA
GetTimeFormatA
DeleteTimerQueueEx
GetLogicalDrives
SetCurrentDirectoryA
GetConsoleCursorInfo
CreateFileW
GetFullPathNameA
CreateIoCompletionPort
CopyFileW
LCMapStringW
OpenEventW
OpenWaitableTimerA
CreateMailslotA
DeleteAtom
SetThreadAffinityMask
GetFileInformationByHandle
SetCalendarInfoA
ReleaseMutex
GetDriveTypeW
CreateWaitableTimerA
GetConsoleMode
GetLocaleInfoA
EnumCalendarInfoExA
SetTapePosition
LoadResource
ResetEvent
GetUserDefaultLangID
GetNamedPipeInfo
GetDateFormatW
MapViewOfFile
WideCharToMultiByte
OpenSemaphoreA
DisconnectNamedPipe
GetCurrentThread
CancelWaitableTimer
GetVolumeInformationW
GetStdHandle
GetCompressedFileSizeA
VirtualAlloc
GetDriveTypeA
MultiByteToWideChar
HeapReAlloc
FindFirstVolumeW
IsDBCSLeadByteEx
GetEnvironmentVariableW
SetProcessPriorityBoost
GetThreadTimes
GetConsoleAliasA
GetCurrentConsoleFont
SetThreadPriorityBoost
GetProfileStringW
GetDevicePowerState
DefineDosDeviceW
DosDateTimeToFileTime
MoveFileWithProgressA
SetConsoleCP
GetSystemDirectoryW
GetCPInfo
ProcessIdToSessionId
GetCurrencyFormatA
ChangeTimerQueueTimer
FindResourceA
GetProcessIoCounters
SetInformationJobObject
OpenFileMappingW
GetModuleFileNameW
SetLocaleInfoW
GetProcessVersion
SetConsoleTextAttribute
GetProcessAffinityMask
GetFileAttributesExW
FreeUserPhysicalPages
PrepareTape
SetThreadPriority
CreateHardLinkA
GetSystemDefaultUILanguage
OpenJobObjectW
GetConsoleAliasExesW
SetEvent
CreateMutexA
GetCommandLineA
HeapSetInformation
ExitProcess
DecodePointer
WriteFile
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetStartupInfoW
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
LoadLibraryW
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
HeapFree
Sleep
IsValidCodePage
RtlUnwind
HeapSize
HeapAlloc
IsProcessorFeaturePresent
user32
IsCharAlphaA
advapi32
RegSetValueW
CreateProcessAsUserW
RegCreateKeyExA
GetLengthSid
RegQueryValueExA
CryptDestroyKey
InitializeSecurityDescriptor
CryptAcquireContextA
ReportEventW
RegOpenKeyA
RegSetValueExA
SetSecurityDescriptorDacl
RegEnumKeyExA
RegisterEventSourceW
RegCreateKeyA
RegCreateKeyW
DuplicateTokenEx
RegOpenKeyW
RegSetValueExW
GetSidSubAuthorityCount
RegDeleteValueA
RegQueryInfoKeyA
GetSecurityDescriptorDacl
CheckTokenMembership
CryptGenRandom
AddAce
RegQueryInfoKeyW
CreateWellKnownSid
LookupAccountSidW
IsValidSecurityDescriptor
StartServiceA
AdjustTokenPrivileges
GetSecurityDescriptorLength
RegNotifyChangeKeyValue
GetSecurityDescriptorSacl
RegEnumKeyA
CryptReleaseContext
Sections
.text Size: 281KB - Virtual size: 281KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 307KB - Virtual size: 307KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 211KB - Virtual size: 563KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ