Static task
static1
Behavioral task
behavioral1
Sample
212f1ca7c9b683882f4fd210639f1aca_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
212f1ca7c9b683882f4fd210639f1aca_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
212f1ca7c9b683882f4fd210639f1aca_JaffaCakes118
-
Size
132KB
-
MD5
212f1ca7c9b683882f4fd210639f1aca
-
SHA1
183ad5d0f01f96ddf75d2ec703f5cb63b3de52c7
-
SHA256
0fb450bd1b76a35a30d29b430d61093c4715a59b7b575c9cd3cad58241d1f0db
-
SHA512
d3b36d74b71dd27aeb303abe932f8b180c05ad509a1ed7437294f5b30a4c0b01f68cdc15a577bf66bd63462742cd22654d3d4c948da0a49b6aa46e9792472689
-
SSDEEP
1536:z1nHFz4FCX3RmXhMiJCvhH9yY5SxBuiGZYx8s+8AaZxiCk3uENF3kUUc9:n4A3kEvSGZYCs+8AaPiVugF3r39
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 212f1ca7c9b683882f4fd210639f1aca_JaffaCakes118
Files
-
212f1ca7c9b683882f4fd210639f1aca_JaffaCakes118.exe windows:4 windows x86 arch:x86
24e6ff8621615baba929aeb34b0986b1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameA
MoveFileExA
GetShortPathNameA
GetWindowsDirectoryA
DeleteFileA
GetPrivateProfileSectionA
WritePrivateProfileSectionA
lstrcpyA
GetCurrentProcess
GetLastError
LoadLibraryA
GetProcAddress
FreeLibrary
OpenEventA
SetEvent
CloseHandle
GetModuleFileNameA
OpenProcess
WaitForSingleObject
Sleep
GetTickCount
IsDBCSLeadByte
WinExec
GlobalSize
CreateFileA
GlobalFree
WriteFile
GetCurrentProcessId
CopyFileA
CreateEventA
CreateProcessA
VirtualProtect
GetTempPathA
GlobalAlloc
SetFilePointer
FindNextFileA
LocalAlloc
LocalFree
GetVersionExA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetEndOfFile
HeapSize
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
InitializeCriticalSection
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetFileSize
FindClose
lstrlenA
lstrcmpA
lstrcmpiA
GetCurrentDirectoryA
FindFirstFileA
SetFileAttributesA
lstrcatA
GetFileAttributesA
RemoveDirectoryA
lstrcpynA
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetEnvironmentStringsW
WideCharToMultiByte
SetCurrentDirectoryA
ReadFile
HeapAlloc
HeapFree
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RaiseException
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
MultiByteToWideChar
VirtualFree
VirtualAlloc
HeapReAlloc
HeapDestroy
HeapCreate
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
user32
DestroyWindow
SetWindowPos
GetWindowLongA
AdjustWindowRect
MapDialogRect
SetRect
IsDlgButtonChecked
GetClientRect
PostQuitMessage
PeekMessageA
ShowWindow
SendDlgItemMessageA
CreateDialogParamA
MessageBoxA
DispatchMessageA
TranslateMessage
IsDialogMessageA
GetMessageA
SetDlgItemTextA
ExitWindowsEx
GetDlgItem
SetWindowTextA
wsprintfA
LoadStringA
CharPrevA
comdlg32
GetFileTitleA
advapi32
OpenProcessToken
RegDeleteKeyA
RegCreateKeyExA
RegEnumKeyExA
RegOpenKeyExA
AdjustTokenPrivileges
LookupPrivilegeValueA
RegQueryValueExA
RegCloseKey
shell32
SHChangeNotify
SHGetPathFromIDListA
SHGetSpecialFolderLocation
comctl32
ord8
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ