Static task
static1
Behavioral task
behavioral1
Sample
157e54c8ea0cda3ec55f1dcef00886ff_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
157e54c8ea0cda3ec55f1dcef00886ff_JaffaCakes118
-
Size
412KB
-
MD5
157e54c8ea0cda3ec55f1dcef00886ff
-
SHA1
b6fa199f6f79ed206a9b6639d8ca3515866cd8c0
-
SHA256
b710d6999c1e37fb81e9baebd936d1fcfe0bd360145e5331c43ec4152f57aecc
-
SHA512
9aff36f37cfa2be275c7c855ea0496ddf1a464717d536e5431615d5e5fec52c8ca487ef672be45efae619d526e309e616534c428d8c0ae1ce97c0693bcbbf8c3
-
SSDEEP
12288:wuovPde76pk6absR9KKQ48IqgGe/RdAg:wbe26bM9KKQ4pqgGeEg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 157e54c8ea0cda3ec55f1dcef00886ff_JaffaCakes118
Files
-
157e54c8ea0cda3ec55f1dcef00886ff_JaffaCakes118.exe windows:4 windows x86 arch:x86
9b716776428b2e56f91e12e51e5423bc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSettings
rpcrt4
UuidCreate
ole32
CoTaskMemFree
CoTaskMemAlloc
dbghelp
ImagehlpApiVersion
FindExecutableImage
ImageRvaToVa
ImageRvaToSection
GetTimestampForLoadedLibrary
FindExecutableImageEx
version
GetFileVersionInfoSizeW
VerQueryValueW
GetFileVersionInfoW
user32
GetDC
GetKeyboardLayout
GetKeyboardLayoutList
GetMenuCheckMarkDimensions
GetMonitorInfoA
GetSysColor
GetSystemMetrics
ReleaseDC
SystemParametersInfoA
EnumDisplayMonitors
kernel32
FormatMessageW
FreeLibrary
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDiskFreeSpaceExW
GetFileAttributesW
GetFileType
GetLastError
GetLocalTime
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetProcAddress
GetProcessHeap
GetProcessTimes
GetShortPathNameA
GetStringTypeExW
GetSystemDefaultLCID
GetSystemDirectoryW
GetSystemInfo
GetSystemTimeAsFileTime
GetSystemWindowsDirectoryW
GetTempPathW
DeleteCriticalSection
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
GetVersionExA
GlobalAlloc
GlobalFree
GlobalMemoryStatus
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapLock
HeapReAlloc
HeapSize
HeapUnlock
FindNextFileW
InterlockedCompareExchange
InterlockedExchange
IsDBCSLeadByte
IsDebuggerPresent
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadLibraryExW
LoadLibraryW
LocalAlloc
LocalFree
MultiByteToWideChar
OutputDebugStringA
QueryPerformanceCounter
RaiseException
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryW
SetFileAttributesW
SetLastError
SetLocalTime
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
VirtualAlloc
VirtualFree
VirtualProtect
WaitForSingleObject
WideCharToMultiByte
WriteFile
CreateSemaphoreA
CreateMutexA
CreateFileW
CreateDirectoryW
CloseHandle
FindFirstFileW
FindClose
ExpandEnvironmentStringsW
EnterCriticalSection
InitializeCriticalSection
DeleteFileW
GetTickCount
advapi32
GetTraceEnableLevel
AddAccessDeniedAce
GetTokenInformation
GetSecurityDescriptorDacl
GetLengthSid
FreeSid
CopySid
ConvertStringSecurityDescriptorToSecurityDescriptorW
UnregisterTraceGuids
TraceEvent
SetSecurityDescriptorDacl
RegisterTraceGuidsA
RegSetValueExW
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
RegQueryInfoKeyW
RegOpenKeyExW
RegOpenKeyExA
RegEnumKeyW
RegCreateKeyExW
RegCloseKey
OpenThreadToken
OpenProcessToken
IsValidSid
InitializeSecurityDescriptor
InitializeAcl
GetTraceLoggerHandle
ConvertSidToStringSidA
CheckTokenMembership
AllocateAndInitializeSid
AddAccessAllowedAce
shlwapi
StrCmpNA
StrChrA
PathFileExistsA
ChrCmpIA
gdi32
DeleteObject
DeleteDC
CreateSolidBrush
CreateDCA
GetDeviceCaps
dsound
ord9
Sections
.text Size: 336KB - Virtual size: 335KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ