Static task
static1
Behavioral task
behavioral1
Sample
013b5fdeb44526e3287d5afb9d036684_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
013b5fdeb44526e3287d5afb9d036684_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
013b5fdeb44526e3287d5afb9d036684_JaffaCakes118
-
Size
552KB
-
MD5
013b5fdeb44526e3287d5afb9d036684
-
SHA1
759d39c4080ff49ba00a4af96d386fb0d06c8878
-
SHA256
17475b52b4a70b80e329c48b9f572724518a10921ec1cb8bfbd51ba53aa45a2a
-
SHA512
6fa7bf6ac24292adc96f33d4df4e92bae7af5d887f5179e476455bf20db55b31218c816b6246d45939ef4fab0ed4a65ae2ef866f430dd3eca9ee9cc153046264
-
SSDEEP
12288:GrpvXwnWJX0CE3cveqVIfKrWqnROQeNJIHfY:UAy430eqVIfKl4QOJE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 013b5fdeb44526e3287d5afb9d036684_JaffaCakes118
Files
-
013b5fdeb44526e3287d5afb9d036684_JaffaCakes118.exe windows:4 windows x86 arch:x86
8e1be99146d3c3881d79f991279d1ef9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyW
InitiateSystemShutdownW
CryptDecrypt
CryptSetProviderExW
RegEnumKeyW
CryptVerifySignatureW
CryptDuplicateKey
StartServiceA
RegEnumValueW
shell32
SHInvokePrinterCommandA
FindExecutableW
SHGetSpecialFolderLocation
gdi32
StartDocA
CreateHalftonePalette
CreateBitmapIndirect
StretchDIBits
GetEnhMetaFileDescriptionW
SetColorAdjustment
EnumICMProfilesW
MoveToEx
Rectangle
GetWinMetaFileBits
OffsetWindowOrgEx
TextOutW
CreateRoundRectRgn
SwapBuffers
user32
GetMenuStringA
RegisterClipboardFormatA
CloseWindowStation
TrackMouseEvent
RegisterClassExA
TranslateMDISysAccel
InSendMessage
GetClipboardFormatNameW
RegisterClassA
SetThreadDesktop
EnumPropsW
kernel32
TlsFree
GetUserDefaultLCID
CreateProcessW
HeapAlloc
GetCommandLineA
VirtualProtect
GetCurrentProcessId
GetLocaleInfoW
CompareStringA
SetConsoleCP
GetLastError
InterlockedExchange
GetTimeZoneInformation
OpenMutexA
GetOEMCP
HeapSize
HeapReAlloc
VirtualAlloc
CompareStringW
SetFilePointer
IsBadWritePtr
SetThreadIdealProcessor
SetEnvironmentVariableA
EnumSystemLocalesA
HeapDestroy
IsValidCodePage
TlsAlloc
GetPrivateProfileSectionNamesA
WriteFile
GetStringTypeW
ReadFile
GetModuleFileNameA
LCMapStringW
IsValidLocale
EnterCriticalSection
RtlUnwind
GetModuleFileNameW
GetDiskFreeSpaceExA
GetTimeFormatA
VirtualFree
lstrcmpi
QueryPerformanceCounter
GetStdHandle
TerminateProcess
FreeEnvironmentStringsA
UnhandledExceptionFilter
CloseHandle
GetEnvironmentStrings
LCMapStringA
TlsSetValue
GetCurrentProcess
GetStartupInfoW
SetThreadContext
CreateMutexA
ReadConsoleOutputW
GetLocaleInfoA
GetFileType
WriteConsoleOutputAttribute
FreeEnvironmentStringsW
EnumTimeFormatsW
GetProcAddress
GetNamedPipeInfo
GetACP
GetStartupInfoA
VirtualQuery
GetModuleHandleA
SetEndOfFile
OpenProcess
GetCurrentThread
GetStringTypeA
LeaveCriticalSection
HeapCreate
WideCharToMultiByte
GetDateFormatA
GetCPInfo
ExitProcess
DeleteCriticalSection
SetHandleCount
LoadLibraryA
MultiByteToWideChar
CreatePipe
GetSystemTimeAsFileTime
IsBadReadPtr
WriteConsoleA
CreateRemoteThread
FlushFileBuffers
GetSystemInfo
GetDateFormatW
SetEnvironmentVariableW
HeapFree
GetEnvironmentStringsW
WriteConsoleOutputA
InitializeCriticalSection
GetTickCount
GetCommandLineW
TlsGetValue
RemoveDirectoryW
GetCurrentThreadId
SetStdHandle
GetVersionExA
SetLastError
FoldStringW
comctl32
InitCommonControlsEx
Sections
.text Size: 225KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 315KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ