Static task
static1
Behavioral task
behavioral1
Sample
175a35220b4c831a29723e4fd72ec6fc_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
175a35220b4c831a29723e4fd72ec6fc_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
175a35220b4c831a29723e4fd72ec6fc_JaffaCakes118
-
Size
7.4MB
-
MD5
175a35220b4c831a29723e4fd72ec6fc
-
SHA1
0a0a0805b8dee78bb3741456dbe286d7e44d4571
-
SHA256
2144ea09ffa2ce7678557d629997b150ce2c29d6d215c4012546533a939f825c
-
SHA512
4847517fee26a94476c29cc638dcde0526eea7182574b5c542db7cf8a43f23645861b143a7fff09dab1158a5ddf4f3033b96acb190a240014694b2629956cb86
-
SSDEEP
196608:AvOvK4w3qzUe5QtqczIf7RDYjLNULqGV2i4tsZ7AeB/zP3KD2:AvOO3qUe5QtqyIDRDY/6LvV2i4tshZBl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 175a35220b4c831a29723e4fd72ec6fc_JaffaCakes118
Files
-
175a35220b4c831a29723e4fd72ec6fc_JaffaCakes118.exe windows:4 windows x86 arch:x86
bab1b6ae569f5ced2a8cefce9c2b879a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MoveFileExA
GetLocaleInfoW
GetUserDefaultLangID
UnhandledExceptionFilter
FreeEnvironmentStringsA
FlushFileBuffers
lstrcmpiA
GetCPInfo
EnumResourceNamesW
CreateProcessA
GetStringTypeExW
GetCurrentProcess
MultiByteToWideChar
Beep
FlushConsoleInputBuffer
GetFileType
CompareStringW
OpenMutexA
SetFileAttributesA
WritePrivateProfileSectionA
GetProcessTimes
GlobalFlags
GetCommState
GetDiskFreeSpaceW
ExpandEnvironmentStringsW
AllocConsole
ExitProcess
CloseHandle
GetCommandLineW
SetTimeZoneInformation
GetDiskFreeSpaceExA
SetConsoleActiveScreenBuffer
SetThreadLocale
GlobalGetAtomNameW
ReadConsoleOutputA
EnumCalendarInfoW
PurgeComm
ReadConsoleInputW
GetBinaryTypeA
FindNextChangeNotification
GetCommModemStatus
lstrcmpA
user32
UnregisterHotKey
GetMessageA
GetClientRect
GetDlgItem
OpenInputDesktop
IsWindowVisible
GetPropW
SendMessageTimeoutA
GetTabbedTextExtentW
RegisterClipboardFormatW
DragDetect
DrawTextA
SetWindowWord
gdi32
EnumMetaFile
GetLayout
SwapBuffers
DescribePixelFormat
Pie
PolyDraw
CreateBitmap
Chord
SetPixelFormat
ScaleViewportExtEx
PatBlt
GetNearestPaletteIndex
GetDIBColorTable
GetTextAlign
GetClipBox
SetPixel
EndPath
BeginPath
GetGlyphOutlineW
IntersectClipRect
LineDDA
advapi32
RegEnumKeyExA
RegUnLoadKeyA
RegCreateKeyW
SetFileSecurityA
ClearEventLogW
MakeAbsoluteSD
RegOpenKeyA
DeregisterEventSource
MakeSelfRelativeSD
StartServiceW
InitiateSystemShutdownW
RegOpenKeyExA
LockServiceDatabase
RegLoadKeyW
OpenThreadToken
SetSecurityDescriptorDacl
BuildTrusteeWithSidW
RegQueryValueExA
RegSaveKeyA
GetNamedSecurityInfoA
FreeSid
OpenSCManagerA
OpenProcessToken
CryptSignHashW
EqualSid
RegCreateKeyExA
shell32
SHGetDesktopFolder
FindExecutableW
SHLoadInProc
SHBrowseForFolderA
SHGetSpecialFolderLocation
Shell_NotifyIconA
SHFileOperationA
DragFinish
SHGetSpecialFolderPathW
SHFileOperationW
ole32
RevokeDragDrop
CoInitializeEx
oleaut32
QueryPathOfRegTypeLi
SafeArrayGetLBound
SysAllocStringLen
shlwapi
StrCatBuffA
PathRemoveExtensionW
StrStrW
SHSetValueA
msvcrt
_dup2
_mbstrlen
_fcvt
toupper
_wfreopen
_wcsnicmp
_mbctolower
_mbsnbcat
putc
_open_osfhandle
_snprintf
fputwc
wcsncpy
_chdir
_putws
swprintf
wcstol
_wsopen
_spawnv
iswctype
sprintf
tolower
Sections
.text Size: 12KB - Virtual size: 7.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7.3MB - Virtual size: 7.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ