Static task
static1
Behavioral task
behavioral1
Sample
248436eb2bca0437c1c01b5290609c45_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
248436eb2bca0437c1c01b5290609c45_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
248436eb2bca0437c1c01b5290609c45_JaffaCakes118
-
Size
316KB
-
MD5
248436eb2bca0437c1c01b5290609c45
-
SHA1
fd13471ddf1346a494adfcbc0cb8b3ebb417ae4f
-
SHA256
d53fb3229ec67c6f74d4b18b2cdf089c99fa71fe5f88368d45b9c0c378472a5e
-
SHA512
613b5bc28b11091e0851b16c3541f9eb4f6813cfb8bc86a14be8274a94e4634e3edb723e8798e0a7997378135c738ea66d1c62382422614c88f7e7d265cceb42
-
SSDEEP
6144:CFAHsE0Cp0eaD6FP6kYv2lNf9wiRBuS5j17z+MwLrzs60UNxv:CFAjlvv/U2v2iTlf7z+lrA60UNxv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 248436eb2bca0437c1c01b5290609c45_JaffaCakes118
Files
-
248436eb2bca0437c1c01b5290609c45_JaffaCakes118.exe windows:4 windows x86 arch:x86
6510b4a5c06e80669dcd6cb7de04c7ec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNamedPipeInfo
GetVersionExA
GetCommandLineA
WriteProfileStringW
GetFileAttributesExW
MoveFileExW
GetCommConfig
TlsAlloc
VirtualProtect
FillConsoleOutputAttribute
BeginUpdateResourceA
GetSystemTime
CreateThread
lstrcpyA
SetFileAttributesA
RemoveDirectoryA
ExitProcess
GetTapeStatus
EnterCriticalSection
GlobalHandle
GetStringTypeExA
CreateEventW
TerminateProcess
FindResourceExW
user32
WinHelpA
IsWindowVisible
FlashWindowEx
GetFocus
SetWindowsHookExW
AdjustWindowRect
GetClipboardOwner
GetScrollPos
SetRectEmpty
EnumDesktopWindows
GetWindowTextW
GetMessageW
ActivateKeyboardLayout
ShowCaret
GetScrollBarInfo
UnregisterClassA
InvalidateRgn
WindowFromPoint
GetMenuState
CharLowerW
SetLastErrorEx
SetMenuItemBitmaps
DefWindowProcA
LoadImageW
LoadMenuA
SetWindowsHookExA
ToUnicode
SetWindowLongW
BeginPaint
IsDialogMessageA
DialogBoxIndirectParamW
GetSubMenu
GetTabbedTextExtentA
wvsprintfW
CreatePopupMenu
SetTimer
CharPrevW
LoadIconW
SetUserObjectSecurity
DrawTextExW
GetAsyncKeyState
LoadKeyboardLayoutA
CreateDialogIndirectParamA
KillTimer
IsClipboardFormatAvailable
ChangeMenuA
BringWindowToTop
GetUpdateRgn
TranslateMessage
SendDlgItemMessageW
MonitorFromWindow
DrawAnimatedRects
SwapMouseButton
gdi32
PlayEnhMetaFileRecord
SelectPalette
GetTextExtentPoint32A
GetCharWidthW
GetTextFaceW
AddFontResourceA
SetRectRgn
GetTextColor
CreateDiscardableBitmap
SelectObject
CopyEnhMetaFileA
CreateEnhMetaFileW
comdlg32
GetOpenFileNameA
GetFileTitleA
ChooseColorW
advapi32
CryptSetKeyParam
AdjustTokenPrivileges
RegReplaceKeyW
RegQueryInfoKeyA
GetUserNameW
UnlockServiceDatabase
InitiateSystemShutdownW
SetSecurityInfo
MakeAbsoluteSD
RegisterEventSourceA
GetSidIdentifierAuthority
RegRestoreKeyA
CryptReleaseContext
SetTokenInformation
LookupPrivilegeValueW
RegDeleteValueW
RegSetKeySecurity
AccessCheck
RegSaveKeyW
RegOpenKeyW
CryptSignHashW
RegDeleteKeyW
RegConnectRegistryW
DuplicateTokenEx
RegCreateKeyA
LookupAccountSidW
RegOpenKeyA
ObjectCloseAuditAlarmA
InitializeSid
EnumDependentServicesW
ole32
OleConvertOLESTREAMToIStorage
CreateFileMoniker
CoCreateInstance
OleRegEnumVerbs
CoImpersonateClient
StgIsStorageFile
comctl32
ImageList_DragEnter
shlwapi
SHRegOpenUSKeyW
SHQueryValueExW
PathIsSameRootW
PathFindFileNameA
setupapi
SetupDiSetDeviceInstallParamsW
SetupDiRemoveDevice
SetupGetBinaryField
SetupScanFileQueueA
SetupDiGetDeviceInstallParamsW
SetupDiDeleteDeviceInfo
SetupInstallFromInfSectionW
SetupDiEnumDriverInfoW
Sections
.text Size: 284KB - Virtual size: 281KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE