Static task
static1
Behavioral task
behavioral1
Sample
00d3a900b68fb7185c227b63b162d95c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
00d3a900b68fb7185c227b63b162d95c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
00d3a900b68fb7185c227b63b162d95c_JaffaCakes118
-
Size
570KB
-
MD5
00d3a900b68fb7185c227b63b162d95c
-
SHA1
893d56f234f461fad4b8228f9b21fbbaa75d0fcc
-
SHA256
f62a57c7fc20affee7881bc266c950d32a0cd86287cd2da87194cc440240bbd8
-
SHA512
6747994d20db6c780e30c032e373e3c1651a07a26f552a93ea85063db1af054668da3b8fcd7d77ea6d593996e246cf3852d12a88bc8c7554abc53bdb2f224601
-
SSDEEP
12288:uvUbWRAefPuJX3FlgS+rG8Y88TCkoKKC2dKJeybi1VI7T:uvojgPuJX3FJ/8WTCkVKCBJRG1VI/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00d3a900b68fb7185c227b63b162d95c_JaffaCakes118
Files
-
00d3a900b68fb7185c227b63b162d95c_JaffaCakes118.exe windows:4 windows x86 arch:x86
9e4758d3d6497c0f00dcef75b02b964f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
CreatePropertySheetPageA
PropertySheetA
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
LocalFree
LocalAlloc
GetLastError
MultiByteToWideChar
GetCurrentProcess
SetFileAttributesA
CopyFileA
CreateDirectoryA
GetTempPathA
ResumeThread
SetPriorityClass
GetCurrentThread
SetThreadPriority
WriteFile
lstrlenA
lstrcpyA
GetWindowsDirectoryA
ReleaseMutex
GetExitCodeProcess
WaitForSingleObject
WideCharToMultiByte
CreateMutexA
RtlUnwind
GetFileAttributesA
HeapFree
HeapAlloc
InterlockedDecrement
InterlockedIncrement
GetCurrentDirectoryA
GetFullPathNameA
HeapReAlloc
ExitProcess
TerminateProcess
GetStartupInfoA
GetCommandLineA
GetVersion
GetCurrentThreadId
TlsSetValue
FindNextFileA
GetModuleHandleA
SetLastError
TlsGetValue
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateProcessA
OpenProcess
HeapCreate
VirtualFree
VirtualAlloc
LCMapStringA
LCMapStringW
GetCPInfo
GetACP
GetOEMCP
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStringTypeA
GetStringTypeW
SetFilePointer
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
FindClose
SetStdHandle
FlushFileBuffers
SetEndOfFile
GetLocaleInfoW
CreateFileA
GetFileSize
ReadFile
CloseHandle
lstrcmpiA
GetModuleFileNameA
GetDriveTypeA
GetShortPathNameA
IsDBCSLeadByte
GetPrivateProfileStringA
FindResourceA
LoadResource
LockResource
GetSystemDefaultLangID
MulDiv
LoadLibraryA
GetProcAddress
FreeLibrary
GetDiskFreeSpaceA
GetVolumeInformationA
GetVersionExA
GetSystemDirectoryA
GetTempFileNameA
DeleteFileA
GetPrivateProfileIntA
Sleep
FormatMessageA
SetErrorMode
FindFirstFileA
HeapDestroy
TlsAlloc
GetLocaleInfoA
user32
GetWindowLongA
GetWindowThreadProcessId
TranslateMessage
PeekMessageA
CallWindowProcA
FindWindowA
SetClassLongA
LoadIconA
ExitWindowsEx
wsprintfA
GetWindowTextLengthA
SetCursor
LoadCursorA
BeginPaint
EndPaint
GetKeyboardType
EndDialog
GetWindowTextA
GetDlgItemTextA
DialogBoxParamA
SetDlgItemTextA
GetWindow
IsWindowVisible
IsWindowEnabled
GetActiveWindow
SetWindowPos
GetClientRect
SetFocus
SetTimer
GetMessageA
DispatchMessageA
KillTimer
InvalidateRect
OffsetRect
GetSysColor
CharNextA
SetWindowLongA
SendMessageA
GetDlgItem
EnableWindow
BringWindowToTop
CharPrevA
GetParent
PostMessageA
SetWindowTextA
LoadStringA
MessageBoxA
GetSystemMetrics
FlashWindow
GetWindowRect
ScreenToClient
UpdateWindow
wvsprintfA
GetDC
ShowWindow
ReleaseDC
gdi32
SetBkColor
SetTextColor
GetTextExtentPoint32A
RestoreDC
BitBlt
SelectObject
SaveDC
DeleteDC
SetBkMode
CreateCompatibleBitmap
CreateDIBitmap
CreateCompatibleDC
StretchDIBits
SetBrushOrgEx
UnrealizeObject
SetStretchBltMode
RealizePalette
SelectPalette
CreateFontIndirectA
GetDeviceCaps
CreatePalette
ExtTextOutA
DeleteObject
advapi32
RegOpenKeyExA
CloseServiceHandle
AdjustTokenPrivileges
RegCreateKeyExA
RegFlushKey
OpenProcessToken
RegCloseKey
RegSetValueExA
LookupPrivilegeValueA
OpenSCManagerA
RegQueryValueExA
RegEnumValueA
RegDeleteValueA
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
SHBrowseForFolderA
mpr
WNetCloseEnum
WNetEnumResourceA
WNetOpenEnumA
Sections
.text Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 407KB - Virtual size: 408KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE