Static task
static1
Behavioral task
behavioral1
Sample
17daab6694384c39699c58829556a09d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
17daab6694384c39699c58829556a09d_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
17daab6694384c39699c58829556a09d_JaffaCakes118
-
Size
845KB
-
MD5
17daab6694384c39699c58829556a09d
-
SHA1
3fa392919b7eed4a0dd4abcf97f4365a83636084
-
SHA256
2373ab6263115c4fb480b529e35111c54cd54637e73682cc698850d6bfd103e9
-
SHA512
2aa171838a3ce58f5fcdf81246176985a34972f0c5ecb498ba10be237c580684453b1c0d25b089ed3352d0b5bfc82caa879c3ba6c7b8cf9c584c982f59b3d28f
-
SSDEEP
24576:q/1CKg+Qo4LLg+qbS7AXd2TI5SV7wGNnhZ:ThgmBTI5SfN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17daab6694384c39699c58829556a09d_JaffaCakes118
Files
-
17daab6694384c39699c58829556a09d_JaffaCakes118.exe windows:5 windows x86 arch:x86
eae53ecf6e19a63ad8aef92ad44ca049
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiW
CreateThread
GetShortPathNameW
LoadLibraryW
GetDiskFreeSpaceW
lstrcmpiA
lstrcmpW
GetExitCodeProcess
GetPrivateProfileStringW
FindClose
DeleteFileW
MulDiv
OpenProcess
GetCurrentProcess
lstrcpynA
ExitProcess
SetErrorMode
CopyFileW
LoadLibraryA
lstrcpyA
MoveFileW
lstrcpynW
GetFileSize
lstrcpyW
RemoveDirectoryW
GetVersion
WideCharToMultiByte
CreateFileW
ExpandEnvironmentStringsW
GetTickCount
ReadFile
Sleep
CreateProcessW
GetLastError
GlobalAlloc
SetCurrentDirectoryW
GetFullPathNameW
GetSystemDirectoryA
lstrcatA
VirtualProtectEx
GetVersionExW
GlobalFree
FreeLibrary
GetSystemDirectoryW
GetProcAddress
GetCommandLineW
SearchPathW
SetFileTime
GetTempPathW
CloseHandle
WritePrivateProfileStringW
GetTempFileNameW
GlobalUnlock
SetFileAttributesW
FindNextFileW
lstrcatW
GetFileAttributesW
LoadLibraryExW
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
FindFirstFileW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
GetModuleHandleW
GetModuleHandleA
SetFilePointer
CreateDirectoryW
lstrlenA
CompareFileTime
GlobalLock
lstrlenW
WriteFile
WaitForSingleObject
GetWindowsDirectoryW
MultiByteToWideChar
user32
CreateWindowExW
ShowWindow
DrawTextW
PostQuitMessage
DefWindowProcW
EmptyClipboard
ExitWindowsEx
MessageBoxIndirectW
EnableWindow
SetClipboardData
IsWindowVisible
GetSystemMetrics
PeekMessageW
SetWindowPos
IsWindowEnabled
CallWindowProcW
EndPaint
DispatchMessageW
IsWindow
wsprintfW
ScreenToClient
CreatePopupMenu
CharPrevW
GetSysColor
GetWindowRect
CharUpperW
FillRect
SetForegroundWindow
FindWindowExW
CharNextW
TrackPopupMenu
LoadBitmapW
wsprintfA
SetWindowTextW
GetClassInfoW
SendMessageTimeoutW
SetCursor
SetClassLongW
DestroyWindow
SendMessageW
GetDlgItemTextW
SetTimer
BeginPaint
GetMessagePos
SetWindowLongW
GetDC
CharNextA
GetClientRect
GetWindowLongW
SystemParametersInfoW
LoadCursorW
OpenClipboard
CheckDlgButton
LoadImageW
InvalidateRect
AppendMenuW
GetDlgItem
GetSystemMenu
EndDialog
CreateDialogParamW
RegisterClassW
CloseClipboard
DialogBoxParamW
EnableMenuItem
SetDlgItemTextW
gdi32
DeleteObject
SetTextColor
SelectObject
CreateBrushIndirect
GetDeviceCaps
SetBkMode
CreateFontIndirectW
SetBkColor
advapi32
RegQueryValueExW
RegSetValueExW
RegEnumValueW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyW
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
shell32
SHBrowseForFolderW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetFileInfoW
ole32
CoCreateInstance
OleInitialize
CoTaskMemFree
OleUninitialize
comctl32
ord17
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
msvcrt
_c_exit
_exit
_XcptFilter
_cexit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_except_handler3
exit
fclose
fopen
fread
oleacc
ObjectFromLresult
esent
JetEndSession
Sections
.text Size: 515KB - Virtual size: 515KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.joke Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.poke Size: 1024B - Virtual size: 666B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zt Size: - Virtual size: 150KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hk Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zx Size: 199KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zz Size: 53KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ