Static task
static1
Behavioral task
behavioral1
Sample
069e8b11c1f4fa97d2be75c9edae7466_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
069e8b11c1f4fa97d2be75c9edae7466_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
069e8b11c1f4fa97d2be75c9edae7466_JaffaCakes118
-
Size
23KB
-
MD5
069e8b11c1f4fa97d2be75c9edae7466
-
SHA1
e57cede7bc879fe8f8dae3271df6a42fe169ee2e
-
SHA256
7836b41aaabeba7d751c454893f9f45db0064a2b5eda147aced3c79e9e9ef197
-
SHA512
4c134e9dce2305258307257879347d34ea92253b1798923120a16cb95d4df4c44829460fa428ab5df218213931e5065654c4a334eb2eb8fd610ef35cc51f0467
-
SSDEEP
384:E8SmlkP71nSv3Ns1aPiQGkKAeMdtRwKTqDlEExvr6BjAA/Y/Jqx:0ya43NmaP5KAeMK0P+q
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 069e8b11c1f4fa97d2be75c9edae7466_JaffaCakes118
Files
-
069e8b11c1f4fa97d2be75c9edae7466_JaffaCakes118.exe windows:4 windows x86 arch:x86
5100b324cb0eface5882e1734f600493
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FileTimeToLocalFileTime
MoveFileW
GlobalFix
GetNumberOfConsoleInputEvents
GetLocalTime
_lopen
GetProfileIntW
GetStartupInfoA
Sleep
GlobalAlloc
GetLongPathNameW
Sleep
MultiByteToWideChar
SetDefaultCommConfigA
PeekNamedPipe
AllocConsole
GetConsoleInputWaitHandle
GetModuleHandleA
ExitProcess
VirtualLock
lstrcpyW
GetConsoleWindow
RegisterConsoleVDM
GetTimeFormatW
SetFileTime
WriteConsoleInputVDMA
SuspendThread
RtlFillMemory
CreateProcessW
ScrollConsoleScreenBufferW
VirtualAlloc
lstrlenW
FormatMessageW
ShowConsoleCursor
GlobalGetAtomNameW
SetConsoleHardwareState
SetEvent
GetTempFileNameA
GetVDMCurrentDirectories
VirtualFree
GetThreadPriorityBoost
CloseConsoleHandle
ReadFileEx
SetLastError
GetStringTypeExA
GetCurrentDirectoryW
IsBadHugeWritePtr
comdlg32
ChooseColorA
shell32
ExtractAssociatedIconW
FreeIconList
ExtractIconExA
DuplicateIcon
user32
EnumThreadWindows
DrawTextW
EnumDisplaySettingsExA
BlockInput
DdePostAdvise
CloseClipboard
GetDlgCtrlID
CreateDialogParamA
EnumWindowStationsA
DdeImpersonateClient
BeginPaint
GetCursorPos
DragObject
CloseWindowStation
EnumDisplaySettingsW
GetDlgItemTextW
advapi32
RegFlushKey
LsaSetInformationTrustedDomain
QueryServiceStatus
SetNamedSecurityInfoA
LsaICLookupSids
CryptVerifySignatureA
ElfDeregisterEventSource
GetSecurityDescriptorGroup
RegSetValueW
ClearEventLogA
GetOldestEventLogRecord
SetKernelObjectSecurity
CryptGenKey
RegRestoreKeyA
GetAuditedPermissionsFromAclA
LookupPrivilegeValueA
RegEnumKeyA
LsaOpenPolicy
GetMultipleTrusteeA
RegSetValueExW
ConvertSecurityDescriptorToAccessNamedA
LsaEnumerateTrustedDomains
ElfReportEventW
RegEnumKeyExA
RegEnumValueW
msvcrt
strtoul
_strncoll
signal
_ismbblead
wcscoll
iswalnum
_findfirst64
_read
_findnext
_mbclen
remove
_mbctoupper
_lrotr
_adj_fdiv_m16i
fmod
_wgetcwd
_sys_errlist
log
longjmp
calloc
_ismbcdigit
_rmdir
_Gettnames
_umask
__p__pgmptr
sprintf
_ismbchira
_wtol
_ismbbpunct
_findclose
iswspace
iswascii
_timezone
_stricmp
_wspawnv
_inpw
_setsystime
_strupr
vswprintf
gdi32
LineDDA
FixBrushOrgEx
CreateCompatibleDC
DeleteMetaFile
GetTextCharsetInfo
GetNearestColor
ExtEscape
GetMetaFileBitsEx
CreatePenIndirect
GetClipBox
CreateCompatibleBitmap
GetCharWidthW
CreateRectRgn
GetTextAlign
StretchDIBits
SetBkMode
ResizePalette
StartPage
GetICMProfileA
TextOutW
CopyMetaFileA
Sections
.text Size: 6KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ymvhf Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sjkiq Size: 3KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.smyf Size: 6KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ