Static task
static1
Behavioral task
behavioral1
Sample
07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118
-
Size
384KB
-
MD5
07adccbb82d8a156aa3a7be42d967ca0
-
SHA1
66956db9ec2d9ab0c30fa5cb42416597f69f0704
-
SHA256
93e1eca283157f02c728c93c14268a29852a3ab05237ebfb9a80011dc4313b82
-
SHA512
d9f92785e315ca55cd5d61f56f85683e6de5359e6bdfd112f7fa145c87407ebf793a8acee3b8ff86e70a003762a6fe146827799a2982de223002de52b95290f5
-
SSDEEP
6144:oE7J8NrR6WA72Q5pt9/htY5mwBxBLtXII17Q9ruV1//O1S1ynnrvRt6gc+3pp:oyJ8NIWvMzFIdIIC9r0//O1S1ynnrvjl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118
Files
-
07adccbb82d8a156aa3a7be42d967ca0_JaffaCakes118.exe windows:4 windows x86 arch:x86
8842a0a894ec7d6af7b02a65ad6b431e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
CM_Locate_DevNodeW
CM_Get_DevNode_Registry_PropertyW
SetupScanFileQueueW
SetupOpenInfFileW
SetupOpenFileQueue
SetupGetStringFieldW
SetupFindFirstLineW
SetupDiSetSelectedDriverW
CM_Get_DevNode_Status
SetupDiOpenDeviceInfoW
SetupDiOpenDevRegKey
SetupDiInstallDriverFiles
SetupDiGetDriverInstallParamsW
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInstanceIdW
SetupDiGetDeviceInstallParamsW
SetupDiGetClassDevsW
SetupDiEnumDriverInfoW
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiCreateDeviceInfoList
SetupDiBuildDriverInfoList
SetupCloseInfFile
SetupCloseFileQueue
SetupDiSetDeviceInstallParamsW
shell32
ShellExecuteExA
SHGetMalloc
SHGetFolderPathW
ole32
CoInitialize
CoTaskMemFree
CoUninitialize
CoTaskMemAlloc
kernel32
lstrlenW
lstrlenA
lstrcpynW
lstrcmpiW
lstrcmpW
WriteFile
WideCharToMultiByte
WaitForMultipleObjects
UnmapViewOfFile
UnhandledExceptionFilter
SystemTimeToFileTime
Sleep
SetFileTime
SetFilePointer
SetFileAttributesW
SetEvent
SetEndOfFile
ResetEvent
RemoveDirectoryW
ReleaseMutex
ReadFile
QueryPerformanceCounter
MultiByteToWideChar
MoveFileW
MapViewOfFile
LocalFree
LoadLibraryExW
LeaveCriticalSection
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
CloseHandle
CompareFileTime
CompareStringA
CompareStringW
CreateDirectoryW
CreateEventW
CreateFileW
CreateMutexW
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileW
DisableThreadLibraryCalls
EnterCriticalSection
FindNextFileW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDriveTypeW
GetExitCodeProcess
GetExitCodeThread
GetFileSize
GetFileTime
GetFileType
GetLocalTime
GetLocaleInfoW
GetProcAddress
GetProcessHeap
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultLangID
GetVersionExW
GetVolumeInformationW
GlobalAlloc
GlobalFree
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedCompareExchange
wininet
InternetQueryOptionA
InternetGetConnectedState
InternetCanonicalizeUrlW
InternetCrackUrlW
oleaut32
SysFreeString
SysAllocString
SysStringLen
VariantInit
VariantClear
VarR8FromI1
user32
GetKeyboardType
MsgWaitForMultipleObjects
PeekMessageW
GetActiveWindow
SendMessageW
TranslateMessage
ExitWindowsEx
CharUpperW
CharUpperA
CharNextW
CharLowerA
BlockInput
DispatchMessageW
PostMessageW
shlwapi
StrCmpIW
StrCmpW
StrRChrW
StrStrIW
StrToIntExW
UrlGetPartW
PathRemoveBackslashW
PathIsUNCW
PathIsRootW
PathIsRelativeW
PathFindExtensionW
PathStripToRootW
PathCompactPathA
StrChrW
crypt32
CryptHashPublicKeyInfo
CertGetCertificateContextProperty
Sections
.text Size: 280KB - Virtual size: 280KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ