Static task
static1
Behavioral task
behavioral1
Sample
236b7480dfb86d275e6fe6a63fe3c1be_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
236b7480dfb86d275e6fe6a63fe3c1be_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
236b7480dfb86d275e6fe6a63fe3c1be_JaffaCakes118
-
Size
268KB
-
MD5
236b7480dfb86d275e6fe6a63fe3c1be
-
SHA1
6bbdae02f4de2bbec221f4e3c306d443e39d6f60
-
SHA256
c4649a7a0b98942dd2ad28b749895a6a42e2da728855965534a13936892a72fe
-
SHA512
38d61b08cd33e5a57dc3ff5eeba1ae8f4626133ba429f0eff5ffbe7e35cea380211279ca4f69f1e1704f0be211e1a58514ed12ed76e71fcda4f8b4a1dc7f404b
-
SSDEEP
6144:MTqUmdeE2IJoo9V7zNAjcwNFZupqMurBu9AMLMaZ:MTqU0io9V7z0cwBuYMurhMLjZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 236b7480dfb86d275e6fe6a63fe3c1be_JaffaCakes118
Files
-
236b7480dfb86d275e6fe6a63fe3c1be_JaffaCakes118.exe windows:4 windows x86 arch:x86
b16f59ebd7cd9960d5d7358562c49ea0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadProcessMemory
MapViewOfFile
DeviceIoControl
CreateEventA
GetVolumeInformationA
GetDriveTypeA
GetWindowsDirectoryA
GlobalMemoryStatus
lstrcmpiA
GetComputerNameA
ReleaseSemaphore
CreateSemaphoreA
SetConsoleCursorPosition
GetConsoleScreenBufferInfo
ExitProcess
FreeConsole
GetStdHandle
FileTimeToSystemTime
FindNextFileA
PeekNamedPipe
MoveFileA
SetFilePointer
VirtualFree
VirtualAlloc
GetDiskFreeSpaceA
RemoveDirectoryA
GetFullPathNameA
GetStartupInfoA
GetExitCodeProcess
GetFileSize
Process32Next
GetSystemInfo
UnmapViewOfFile
GetCurrentThreadId
MultiByteToWideChar
GetProcAddress
GetEnvironmentVariableW
FreeLibrary
FormatMessageA
LocalFree
lstrlenW
GetVersion
GetModuleHandleA
FindResourceA
LoadResource
LockResource
SizeofResource
GetSystemDirectoryA
DeleteFileA
CopyFileA
TerminateProcess
WaitForMultipleObjects
DisconnectNamedPipe
CreatePipe
GetCurrentProcessId
OpenProcess
LocalAlloc
CreateProcessA
GetTickCount
GetCurrentDirectoryA
SetCurrentDirectoryA
lstrcatA
FileTimeToLocalFileTime
VirtualQueryEx
GetProcessHeap
HeapAlloc
HeapFree
GetVersionExA
LoadLibraryA
Process32First
CreateToolhelp32Snapshot
lstrcpyA
lstrlenA
FindFirstFileA
FindClose
WinExec
GlobalLock
GlobalUnlock
CreateDirectoryA
GetLastError
GetLocalTime
GetCurrentThread
DuplicateHandle
GetCurrentProcess
TerminateThread
WaitForSingleObject
ReadFile
CreateFileA
WriteFile
CreateThread
ExitThread
GetModuleFileNameA
SetConsoleTextAttribute
Sleep
CloseHandle
user32
PeekMessageA
wsprintfA
SystemParametersInfoA
ClipCursor
DispatchMessageA
ReleaseDC
SetUserObjectSecurity
SetWindowsHookExA
GetWindowDC
GetSystemMetrics
GetKeyState
GetWindowTextA
GetActiveWindow
ExitWindowsEx
CallNextHookEx
UnhookWindowsHookEx
GetMessageA
GetThreadDesktop
CloseWindowStation
SetThreadDesktop
CloseDesktop
GetUserObjectSecurity
SetProcessWindowStation
GetProcessWindowStation
OpenClipboard
GetClipboardData
CloseClipboard
gdi32
GetDeviceCaps
CreateCompatibleDC
CreateCompatibleBitmap
DeleteDC
SelectObject
BitBlt
GetDIBits
DeleteObject
advapi32
GetSecurityDescriptorDacl
SetTokenInformation
LookupAccountSidA
GetUserNameA
LsaOpenPolicy
LsaQueryInformationPolicy
LsaFreeMemory
LsaEnumerateTrustedDomains
OpenSCManagerA
CreateServiceA
CloseServiceHandle
RegisterServiceCtrlHandlerA
SetServiceStatus
StartServiceCtrlDispatcherA
RegCreateKeyA
RegCreateKeyExA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
StartServiceA
GetTokenInformation
RegEnumKeyExA
RegQueryInfoKeyA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
QueryServiceConfigA
QueryServiceConfig2A
QueryServiceStatusEx
OpenServiceA
EnumServicesStatusExA
DeleteService
ControlService
QueryServiceStatus
LsaNtStatusToWinError
CreateProcessAsUserA
LookupAccountNameA
IsValidSecurityDescriptor
MakeAbsoluteSD
SetEntriesInAclA
BuildExplicitAccessWithNameA
AllocateLocallyUniqueId
ImpersonateLoggedOnUser
DuplicateTokenEx
shell32
SHGetFileInfoA
SHFileOperationA
ShellExecuteA
odbc32
ord43
ord24
ord11
ord13
ord3
ord75
ord41
ord31
msvcrt
strtoul
realloc
_pclose
srand
_close
_local_unwind2
_adjust_fdiv
strcat
_snprintf
rand
__p__fmode
_mbsicmp
_mbscmp
_mbsrchr
_mbslen
_read
_strdup
_fileno
_controlfp
__setusermatherr
_initterm
__getmainargs
__p___initenv
_XcptFilter
_exit
_strlwr
abs
_ftol
strcpy
memset
atoi
strlen
printf
strncpy
malloc
fclose
sprintf
strtok
fgets
fopen
memcpy
fflush
_iob
exit
system
strstr
memcmp
wcstombs
__set_app_type
_errno
strncmp
_except_handler3
ctime
time
strcmp
strncat
fprintf
strchr
free
fread
ftell
fseek
_popen
__p__commode
_write
_open
strrchr
toupper
signal
wcslen
mbstowcs
wcsncpy
fgetc
putchar
puts
_strupr
abort
isspace
strerror
sscanf
clock
tolower
ws2_32
connect
recvfrom
WSAIoctl
gethostbyaddr
ntohl
WSAStartup
WSACleanup
getpeername
inet_ntoa
getsockname
ntohs
ioctlsocket
select
__WSAFDIsSet
recv
shutdown
socket
bind
listen
accept
gethostname
sendto
send
htonl
WSASocketA
WSAGetLastError
setsockopt
inet_addr
gethostbyname
closesocket
htons
wininet
InternetOpenA
InternetReadFile
InternetOpenUrlA
HttpSendRequestA
InternetCloseHandle
InternetConnectA
InternetCrackUrlA
HttpOpenRequestA
ntdll
_stricmp
ZwQuerySystemInformation
_memicmp
_wcsicmp
_strnicmp
psapi
GetModuleFileNameExA
EnumProcessModules
GetModuleBaseNameA
mpr
WNetOpenEnumA
WNetEnumResourceA
WNetGetUserA
WNetAddConnection2A
WNetCancelConnection2A
WNetCloseEnum
netapi32
NetUserModalsGet
NetApiBufferFree
NetUserGetLocalGroups
NetLocalGroupEnum
NetLocalGroupGetMembers
NetQueryDisplayInformation
NetShareEnum
NetUserEnum
dnsapi
DnsRecordListFree
DnsQuery_A
Sections
.text Size: 176KB - Virtual size: 172KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ