Static task
static1
Behavioral task
behavioral1
Sample
a79397e420c2d3deaf552393faffbafc_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
a79397e420c2d3deaf552393faffbafc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
a79397e420c2d3deaf552393faffbafc_JaffaCakes118
-
Size
625KB
-
MD5
a79397e420c2d3deaf552393faffbafc
-
SHA1
100eaad579f586d1ac9f0a24e3716ab91b75b65a
-
SHA256
8ffceb24b4cb855fb4d191a1428b27a93a2e4eae9e3ad33358915785ded0cfb8
-
SHA512
ccff3e1eadea79706e1fc330d3bdc6741be229c59214cef4bfb6da5627ec6ea687f38bd61487ab3492b019356e4d00cd86c635c4d2a6cd94dbae3398e4b48557
-
SSDEEP
12288:3l8DCU119Mw1dUV+S1/Fy5mDParHo6zBfV4/XdzkbAufaUDi:18+VmiV7oHlzBfV4/XdzQ7i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource a79397e420c2d3deaf552393faffbafc_JaffaCakes118
Files
-
a79397e420c2d3deaf552393faffbafc_JaffaCakes118.exe windows:5 windows x86 arch:x86
6fd2737137bd95ccc52605bf52d91b31
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_GUARD_CF
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
Imports
kernel32
GetFileInformationByHandle
CreateFileW
WriteConsoleW
SetStdHandle
LoadLibraryW
HeapReAlloc
GetStringTypeW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
HeapSize
GetLocaleInfoW
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
FlushFileBuffers
GetConsoleMode
GetConsoleCP
ReadFile
SetFilePointer
GetModuleFileNameW
CloseHandle
IsProcessorFeaturePresent
GetCurrentThreadId
HeapAlloc
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetACP
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetCPInfo
LCMapStringW
WideCharToMultiByte
RtlUnwind
RaiseException
GetStartupInfoW
HeapSetInformation
GetCommandLineA
HeapFree
MultiByteToWideChar
LeaveCriticalSection
GetVersionExA
GetModuleHandleA
GlobalMemoryStatusEx
LocalAlloc
LoadLibraryA
GetProcAddress
lstrcmpiA
GetLastError
GetStdHandle
lstrcatA
HeapCreate
OpenProcess
GetEnvironmentStrings
WriteFile
FreeEnvironmentStringsA
GetProcessHeap
WaitForSingleObject
ExitProcess
GetCurrentProcess
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
Sleep
DecodePointer
EncodePointer
InterlockedDecrement
InterlockedIncrement
lstrlenA
SetLastError
CreateFileA
SetEndOfFile
user32
SetWindowTextA
GetSystemMetrics
BeginDeferWindowPos
ReleaseCapture
DefMDIChildProcA
DeferWindowPos
UpdateWindow
DrawMenuBar
MoveWindow
GetWindow
GetSysColorBrush
ShowWindow
FindWindowA
SetMenuItemInfoA
SetWindowPos
EndDialog
GetDlgItem
ReleaseDC
CreateWindowExA
GetWindowLongA
UnregisterClassA
InvalidateRect
SetWindowLongA
OffsetRect
GetMenu
LoadCursorA
SetWindowTextW
EndDeferWindowPos
GetDialogBaseUnits
CopyRect
DispatchMessageA
GetWindowRect
EndPaint
DestroyWindow
GetMessageA
CreateDialogIndirectParamA
PostThreadMessageA
MapDialogRect
RegisterClassExA
PostQuitMessage
SetCapture
DrawTextW
MsgWaitForMultipleObjects
LoadBitmapA
IsClipboardFormatAvailable
GetParent
LoadIconA
DefFrameProcA
GetClientRect
SendMessageA
SetRectEmpty
BeginPaint
EnumWindows
PtInRect
GetDC
TranslateMessage
GetForegroundWindow
GetWindowThreadProcessId
gdi32
EnumFontFamiliesW
LineTo
CreateFontA
CreateFontIndirectA
SetBkMode
DeleteObject
SelectObject
Rectangle
SetDCPenColor
StretchDIBits
CreatePen
GetObjectA
GetStockObject
TextOutA
MoveToEx
comdlg32
PageSetupDlgW
FindTextW
shell32
SHGetMalloc
SHGetPathFromIDListW
DragFinish
SHGetFileInfoA
DragQueryFileA
DragAcceptFiles
SHBrowseForFolderW
ole32
ReadClassStg
CreateBindCtx
CoSuspendClassObjects
StgCreateDocfile
StgOpenStorage
WriteClassStg
oleaut32
VariantClear
SysFreeString
wininet
InternetGetLastResponseInfoW
psapi
GetProcessMemoryInfo
msacm32
acmStreamUnprepareHeader
acmStreamClose
acmStreamOpen
acmStreamPrepareHeader
winmm
mmioWrite
mmioCreateChunk
mmioClose
mmioAscend
mmioDescend
mmioOpenW
mmioRead
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
comctl32
ord17
InitCommonControlsEx
pdh
PdhEnumMachinesA
wintrust
WinVerifyTrust
rpcrt4
RpcErrorStartEnumeration
gdiplus
GdipSaveImageToFile
GdipCloneImage
GdiplusStartup
GdiplusShutdown
GdipFree
GdipLoadImageFromFile
GdipAlloc
GdipDisposeImage
Sections
.text Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ldata Size: 180KB - Virtual size: 179KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cdata Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.relok Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 123KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ