Static task
static1
Behavioral task
behavioral1
Sample
023e8942393f020f15eabbe8af15dab1_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
023e8942393f020f15eabbe8af15dab1_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
023e8942393f020f15eabbe8af15dab1_JaffaCakes118
-
Size
455KB
-
MD5
023e8942393f020f15eabbe8af15dab1
-
SHA1
8adb2cb0cf7398bc187cc2f501507e3a70261a9b
-
SHA256
dd9fc681237d483bb0163242e2193471faa906f1df0d1a5449261c88c4f4d041
-
SHA512
8af5fb87253a29ea30a493a01fbe56f1b852329b44ba6d0a7499d87e863c00b303a59c7fd0c6d07d3e9a5682ea1d509a844850df29aebfb4156438a2eb6c915e
-
SSDEEP
12288:AKJrWUciLllbxmU93mWzXJbxFWgKhY9Ptk:AKdWpih5xmUNmWzXNrWL8tk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 023e8942393f020f15eabbe8af15dab1_JaffaCakes118
Files
-
023e8942393f020f15eabbe8af15dab1_JaffaCakes118.exe windows:5 windows x86 arch:x86
4d35dc8d1d4990c0714713292347e161
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord4213
ord2570
ord4392
ord3577
ord3605
ord3714
ord2294
ord2634
ord6195
ord3871
ord2755
ord5977
ord4490
ord4532
ord4440
ord693
ord641
ord795
ord2859
ord2574
ord4396
ord3365
ord3635
ord6003
ord3993
ord3991
ord6898
ord3281
ord3716
ord4229
ord4370
ord5276
ord3592
ord324
ord2291
ord4847
ord941
ord6303
ord3579
ord543
ord803
ord521
ord3092
ord5268
ord927
ord2776
ord3087
ord1775
ord6648
ord1771
ord4050
ord2355
ord2289
ord2637
ord6211
ord2284
ord2357
ord3867
ord4197
ord4272
ord818
ord2455
ord1644
ord600
ord1240
ord1173
ord1571
ord1250
ord1248
ord1563
ord1194
ord342
ord1179
ord1570
ord1568
ord1115
ord269
ord826
ord773
ord823
ord998
ord5617
ord3697
ord501
ord538
ord861
ord800
ord5603
ord540
ord858
ord535
ord3658
ord1262
ord4155
ord2810
ord1165
ord3621
ord2406
ord3566
ord1662
ord2644
ord6466
ord5293
ord2385
ord942
ord2015
ord2403
ord567
ord3569
ord3397
ord4831
ord5286
ord4390
ord1768
ord6051
ord2567
ord2371
ord6451
ord6024
ord793
ord656
ord609
ord616
ord1899
ord1144
ord1197
ord5852
ord2910
ord539
ord2350
ord5949
ord4219
ord6330
ord2362
ord2281
ord2293
ord1196
ord2729
ord2606
ord6278
ord6279
ord489
ord5798
ord4970
ord768
ord3694
ord4419
ord4621
ord5273
ord2116
ord2438
ord5257
ord1720
ord5059
ord3744
ord6372
ord2047
ord2640
ord4435
ord4829
ord3793
ord5283
ord4347
ord6370
ord5157
ord2377
ord5237
ord4401
ord1767
ord4073
ord940
ord5568
ord2914
ord5706
ord536
ord2820
ord4199
ord4124
ord1634
ord1143
ord802
ord5618
ord6563
ord1001
ord542
ord1258
ord6371
ord4480
ord2546
ord2504
ord5727
ord3917
ord1089
ord5193
ord2388
ord825
ord3341
ord5296
ord5298
ord4074
ord4692
ord5303
ord5285
ord5710
ord2977
ord3142
ord3254
ord4459
ord3131
ord3257
ord2980
ord3076
ord2971
ord3396
ord3825
ord3826
ord3820
ord3074
ord4075
ord4616
ord4418
ord3733
ord561
ord815
ord3948
ord2717
ord1128
ord4253
ord5155
ord5156
ord5154
ord4899
ord4736
ord4942
ord4352
ord5261
ord4371
ord4848
ord4992
ord4704
ord2506
ord6048
msvcrt
free
iswspace
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
_CxxThrowException
calloc
_wtoi64
_wcsnicmp
_stricmp
wcschr
_purecall
_except_handler3
wcsncmp
memmove
wcslen
_wcsicmp
__RTDynamicCast
wcscpy
wcscmp
__CxxFrameHandler
malloc
atl
ord15
ord22
ord18
ord21
ord16
ord32
user32
SetWindowsHookExW
CallNextHookEx
UnhookWindowsHookEx
GetDlgCtrlID
GetWindowRect
KillTimer
SetTimer
DialogBoxParamW
MsgWaitForMultipleObjects
TranslateMessage
DispatchMessageW
PeekMessageW
EnumThreadWindows
GetDesktopWindow
GetFocus
SetActiveWindow
SetWindowTextW
ShowWindow
GetParent
PostMessageW
LoadIconW
GetSystemMetrics
LoadBitmapW
SetDlgItemTextW
GetDlgItem
EnableWindow
EndDialog
IsDlgButtonChecked
GetDlgItemTextW
GetWindowLongW
SendMessageW
SetWindowLongW
SetFocus
WinHelpW
IsWindowVisible
GetClientRect
MessageBoxW
RegisterClipboardFormatW
LoadStringW
wsprintfW
GetActiveWindow
oleaut32
SafeArrayGetUBound
SysFreeString
VariantClear
SafeArrayCreate
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetLBound
SysAllocString
SafeArrayGetElement
VariantCopy
VariantInit
ole32
ReleaseStgMedium
CoInitialize
CoUninitialize
CreateStreamOnHGlobal
GetHGlobalFromStream
CoTaskMemAlloc
StringFromGUID2
StringFromCLSID
CoTaskMemFree
CoCreateInstance
advapi32
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
InitializeSecurityDescriptor
CopySid
GetLengthSid
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
RegDeleteKeyW
RegEnumKeyExW
LsaOpenPolicy
LsaLookupNames
GetSidSubAuthorityCount
GetSidSubAuthority
LsaFreeMemory
LsaOpenAccount
LsaCreateAccount
LsaGetSystemAccessAccount
LsaSetSystemAccessAccount
LsaClose
GetSecurityDescriptorLength
GetSecurityDescriptorControl
AllocateAndInitializeSid
MakeSelfRelativeSD
FreeSid
MapGenericMask
ControlService
StartServiceW
EnumDependentServicesW
ChangeServiceConfigW
QueryServiceStatusEx
RevertToSelf
IsWellKnownSid
RegConnectRegistryW
QueryServiceStatus
GetUserNameW
RegDeleteValueW
EnumServicesStatusW
OpenSCManagerW
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
AddAccessAllowedAce
InitializeAcl
SetSecurityDescriptorDacl
shell32
ord17
ord18
ord16
SHChangeNotify
ord152
ord155
ord190
activeds
ord3
shlwapi
ord437
gdi32
DeleteObject
cfgmgr32
CM_Get_Device_ID_List_Size_ExW
CM_Get_Device_ID_List_ExW
CM_Disconnect_Machine
CM_Get_DevNode_Registry_Property_ExW
CM_Locate_DevNode_ExW
CM_Get_Hardware_Profile_Info_ExW
CM_Get_HW_Prof_Flags_ExW
CM_Connect_MachineW
CM_Set_HW_Prof_Flags_ExW
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj5 Size: 512B - Virtual size: 196B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj50 Size: 512B - Virtual size: 232B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj51 Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj52 Size: 205KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj53 Size: 205KB - Virtual size: 204KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj54 Size: 512B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj55 Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fhj56 Size: 512B - Virtual size: 216B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fhj57 Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fhj58 Size: 512B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fhj59 Size: 512B - Virtual size: 212B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.1231 Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.JAKS Size: 512B - Virtual size: 246B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.GAHS Size: 512B - Virtual size: 198B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.HAJS Size: 512B - Virtual size: 458B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.HnJS Size: 512B - Virtual size: 168B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SKALS Size: 512B - Virtual size: 242B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SKAkS Size: 512B - Virtual size: 260B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 330B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ