Static task
static1
Behavioral task
behavioral1
Sample
1a1002113ea49c59674dc354889cb0fa_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1a1002113ea49c59674dc354889cb0fa_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1a1002113ea49c59674dc354889cb0fa_JaffaCakes118
-
Size
80KB
-
MD5
1a1002113ea49c59674dc354889cb0fa
-
SHA1
8485c2fce953abc4d0e38f454547fd519c2fe9a0
-
SHA256
0cb3ef2d2b249f280560c583577a99a68eab63faaca28469e21e181689bf5c2a
-
SHA512
f9b8494ae6786fed41cfb4e79d70ece3db3909a3f82d9ebd50dbe2697e9865ae322b5e912e84c7c70531593647241b0cebad1055f1603c6c542299c54a32b9f1
-
SSDEEP
1536:gthzccC9duGf6IuIhBZFZpkqefcANF5znliywsu:gPzh4c8uIjiDfc4fwsu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1a1002113ea49c59674dc354889cb0fa_JaffaCakes118
Files
-
1a1002113ea49c59674dc354889cb0fa_JaffaCakes118.exe windows:4 windows x86 arch:x86
4540f02ba7de9fdad30988e0ac836a1e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
GetCurrentProcessId
DeleteFileA
CopyFileA
CreateMutexA
GetModuleFileNameA
GetShortPathNameA
GetVersion
GetModuleHandleA
GetTickCount
GetLocaleInfoA
GetSystemDefaultLCID
FindNextFileA
FindFirstFileA
MultiByteToWideChar
WriteFile
MoveFileW
ReadFile
CreateFileW
DuplicateHandle
VirtualAlloc
VirtualFree
CompareStringW
GetSystemDirectoryW
FindClose
GetStartupInfoA
GetCurrentThreadId
CreateThread
GetVolumeInformationA
LocalAlloc
LocalFree
GetLocalTime
InterlockedDecrement
SetFileTime
CloseHandle
GetFileTime
CreateFileA
GetWindowsDirectoryA
GetLastError
GetVersionExA
GetFileSize
WideCharToMultiByte
HeapFree
HeapAlloc
GetProcessHeap
OpenProcess
CreateProcessA
GetCurrentProcess
GetWindowsDirectoryW
lstrcatA
lstrcpyA
lstrcpynA
lstrcmpA
lstrlenA
GetProcAddress
LoadLibraryA
WritePrivateProfileStringA
GetSystemDirectoryA
GetPrivateProfileIntA
GetPrivateProfileStringA
TerminateProcess
GetExitCodeProcess
Sleep
InterlockedIncrement
advapi32
CryptExportKey
CryptDeriveKey
RegSetValueExW
RegOpenKeyExW
CryptEncrypt
CryptImportKey
CryptReleaseContext
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptAcquireContextA
RegCloseKey
RegSetValueExA
RegOpenKeyExA
LookupAccountSidA
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegQueryValueExA
RegEnumKeyExA
RegEnumValueA
CryptDestroyKey
CryptGenKey
CryptGetUserKey
GetUserNameA
OpenSCManagerA
CreateServiceA
CloseServiceHandle
CryptDecrypt
gdi32
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteObject
gdiplus
GdipGetImageThumbnail
GdipFree
GdipAlloc
GdipCloneImage
GdipCreateBitmapFromHBITMAP
GdipGetImageEncodersSize
GdipDisposeImage
GdipSaveImageToStream
GdiplusStartup
GdiplusShutdown
GdipGetImageEncoders
mfc42
ord354
ord665
ord5186
ord6385
ord1979
ord1238
ord535
ord924
ord922
ord1601
ord2241
ord800
ord3337
ord3811
ord858
ord823
ord537
ord2915
ord2818
ord939
ord5572
ord825
ord540
ord2614
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__CxxFrameHandler
??1type_info@@UAE@XZ
_CxxThrowException
_ltoa
_wcsupr
strcat
strlen
strstr
memset
wcslen
_except_handler3
fclose
fopen
free
_acmdln
_XcptFilter
_exit
_onexit
__dllonexit
fwrite
_wcsicmp
memcmp
strncmp
tmpnam
fgetc
_unlink
strncpy
strcpy
memcpy
putc
_splitpath
_strupr
_strcmpi
exit
_strlwr
_mbsrchr
sprintf
fprintf
malloc
wcsncpy
wcsncmp
wcscat
wcscpy
ole32
OleInitialize
CoCreateInstance
OleUninitialize
CreateStreamOnHGlobal
oleaut32
SysAllocString
VariantCopy
SysAllocStringLen
VariantClear
VariantInit
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
GetErrorInfo
SysFreeString
user32
wsprintfA
GetDC
ShowWindow
FindWindowExA
GetWindowTextA
EnumWindows
DispatchMessageA
TranslateMessage
GetMessageA
IsCharAlphaNumericA
wsprintfW
ReleaseDC
GetSystemMetrics
wininet
FindCloseUrlCache
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
DeleteUrlCacheEntry
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 824B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rebld_r Size: 816B - Virtual size: 816B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rebld_i Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE