Static task
static1
Behavioral task
behavioral1
Sample
24569fe084bf320c7308a656ef148d2a_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
24569fe084bf320c7308a656ef148d2a_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
24569fe084bf320c7308a656ef148d2a_JaffaCakes118
-
Size
332KB
-
MD5
24569fe084bf320c7308a656ef148d2a
-
SHA1
edbd1481268772147bacf36c794df2d9e9a23a56
-
SHA256
4c35cf00d4ce86b9e3dcf0bc674589939baa5a9f6d71ed5890a50a9d8bc3f923
-
SHA512
16aea6c53b436a6501e414c9faf30af20dcb657629e8b76c493a287c21dd1e8583e6aecf3673c15c08172a9f9c7ff87da3160b3ce1c945124bc3a09c50af743d
-
SSDEEP
6144:sNJQnh/706FLObFgZds2uyC6UVgHOz4JW8Em1rJiElUf53hNbPrlcdcUoNTv:2QB70uKbFgCr6dOEM8Z11lS53PPRc5oN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 24569fe084bf320c7308a656ef148d2a_JaffaCakes118
Files
-
24569fe084bf320c7308a656ef148d2a_JaffaCakes118.exe windows:4 windows x86 arch:x86
c9067d0dd0f2fa5b0fb1057e503a0f8c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStringTypeA
SetNamedPipeHandleState
SetCurrentDirectoryA
FormatMessageA
ReadConsoleOutputW
CompareStringA
OpenFileMappingW
SearchPathA
GetProfileStringW
CreateRemoteThread
SetProcessAffinityMask
CreateFiber
SetErrorMode
lstrcmpiA
GetLargestConsoleWindowSize
EnumTimeFormatsW
EscapeCommFunction
_lread
SetThreadAffinityMask
BackupSeek
OpenEventA
lstrcmpA
HeapCreate
EnumResourceLanguagesW
WaitForSingleObjectEx
VirtualUnlock
GetACP
CloseHandle
SetThreadPriorityBoost
GetProcessTimes
CreateFileW
TerminateThread
CreateSemaphoreA
WriteProfileStringA
SetFileAttributesW
EnumResourceLanguagesA
DuplicateHandle
GetSystemDirectoryW
FileTimeToSystemTime
GetPrivateProfileStringA
HeapAlloc
FindAtomW
CreateEventW
GlobalFlags
LockFile
GetSystemDirectoryA
PeekNamedPipe
DeviceIoControl
GetFileTime
FillConsoleOutputAttribute
GetVolumeInformationA
GetSystemTimeAdjustment
GetThreadPriority
LocalFree
OpenSemaphoreA
DeleteFileW
MulDiv
FindFirstFileA
UnmapViewOfFile
CreateMailslotA
IsValidLocale
DosDateTimeToFileTime
lstrcpynW
SetHandleCount
GlobalFindAtomA
GetBinaryTypeW
_lcreat
GetCommConfig
VirtualQueryEx
FreeLibraryAndExitThread
MoveFileExA
SetConsoleWindowInfo
FindResourceA
GetFileInformationByHandle
SizeofResource
GlobalAlloc
GlobalReAlloc
UpdateResourceA
SetConsoleTitleA
DebugBreak
GetVersionExA
GetCommandLineA
VirtualProtect
CreateMutexA
ExitProcess
user32
CreateIconFromResource
FillRect
SetWindowPlacement
CreateDialogParamA
InsertMenuItemA
FindWindowExW
CreateAcceleratorTableW
GetWindowTextA
EnumDesktopWindows
CreateWindowStationW
GetDlgCtrlID
TrackPopupMenuEx
SetRect
CreateIconIndirect
gdi32
MaskBlt
GetROP2
OffsetClipRgn
CreatePolygonRgn
InvertRgn
comdlg32
FindTextW
advapi32
CryptVerifySignatureA
CryptImportKey
ChangeServiceConfigA
CryptSetHashParam
RegSaveKeyW
NotifyBootConfigStatus
CreateServiceA
MapGenericMask
PrivilegeCheck
FreeSid
SetServiceStatus
RegQueryValueExA
SetSecurityDescriptorOwner
CloseServiceHandle
CryptAcquireContextA
GetLengthSid
GetSecurityDescriptorGroup
DeleteService
MakeSelfRelativeSD
CreateProcessAsUserA
MakeAbsoluteSD
shell32
FindExecutableA
DragFinish
SHFileOperationA
DragQueryFileA
ExtractAssociatedIconW
DoEnvironmentSubstW
ole32
CoTreatAsClass
DoDragDrop
OleRun
CoIsOle1Class
oleaut32
SafeArrayAccessData
VariantCopyInd
shlwapi
StrCpyW
PathIsRootW
PathIsUNCServerW
PathIsDirectoryEmptyW
StrCmpNW
StrCatBuffW
PathStripPathA
PathGetDriveNumberW
StrFormatKBSizeW
SHRegCreateUSKeyW
setupapi
SetupCloseFileQueue
SetupDiGetDriverInfoDetailW
Sections
.text Size: 276KB - Virtual size: 275KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE