Static task
static1
Behavioral task
behavioral1
Sample
251c434a077de56e4462616db0aa8242_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
251c434a077de56e4462616db0aa8242_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
251c434a077de56e4462616db0aa8242_JaffaCakes118
-
Size
242KB
-
MD5
251c434a077de56e4462616db0aa8242
-
SHA1
72a2d7fa0ec3e68225add405a893cd6a90bfc962
-
SHA256
c5081b793d4ee3f0fc526332934b521064a6a5e3482b7fd64d56bf71dc886a45
-
SHA512
b18b05d887f74d1068e29ef8fad5e18b24e72a20a487a8114af416555ebe16788593f466269f54dd018ce4f3d880b493e13919a6144e25ba7d4b8d7d45a79e2c
-
SSDEEP
6144:2U2VV+2vr+TXLReTXjy0G7m+O2l90rSi7k:p2VV+5NeTMGE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 251c434a077de56e4462616db0aa8242_JaffaCakes118
Files
-
251c434a077de56e4462616db0aa8242_JaffaCakes118.exe windows:5 windows x86 arch:x86
d7466aeb60cf0128cbb76b831d7cf511
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
powrprof
GetCurrentPowerPolicies
kernel32
GetLastError
GetProcAddress
GetModuleHandleA
lstrlenA
lstrcmpiA
CloseHandle
GetLocaleInfoA
GetUserDefaultUILanguage
TerminateProcess
GetExitCodeProcess
OpenProcess
Process32Next
Process32First
CreateToolhelp32Snapshot
GetSystemDirectoryA
FindClose
FindFirstFileA
InterlockedIncrement
GetModuleFileNameA
GetModuleHandleW
GetVersionExA
CreateProcessA
IsDBCSLeadByte
FreeLibrary
SizeofResource
LoadResource
FindResourceA
DeleteCriticalSection
Sleep
LoadLibraryA
CreateMutexA
GetCurrentThreadId
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
SetEndOfFile
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
ReadFile
CreateFileA
FlushFileBuffers
SetStdHandle
GetConsoleMode
GetConsoleCP
SetFilePointer
InitializeCriticalSection
RaiseException
lstrlenW
WideCharToMultiByte
GetFileType
MultiByteToWideChar
CompareFileTime
InterlockedDecrement
GetSystemPowerStatus
SetHandleCount
LoadLibraryExA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetSystemTimeAsFileTime
GetCurrentProcessId
GetOEMCP
GetACP
GetCPInfo
GetStdHandle
WriteFile
ExitProcess
HeapCreate
GetTickCount
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
HeapFree
GetProcessHeap
RtlUnwind
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
DeleteFileA
GetStartupInfoA
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
VirtualFree
HeapReAlloc
user32
PostThreadMessageA
ChangeDisplaySettingsExA
ChangeDisplaySettingsA
CharNextW
CharNextA
SetTimer
PostMessageA
RegisterWindowMessageA
EnumDisplaySettingsA
GetMessageA
SendNotifyMessageA
KillTimer
RegisterClassA
CreateWindowExA
EnumDisplayDevicesA
DispatchMessageA
PostQuitMessage
RegisterDeviceNotificationA
DefWindowProcA
FindWindowA
advapi32
RegSetValueExA
RegOpenKeyA
RegQueryInfoKeyA
RegDeleteValueA
RegEnumKeyExA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
shell32
ShellExecuteExA
SHGetFolderPathA
SHCreateDirectoryExA
ole32
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemFree
CoUninitialize
CoInitialize
StringFromGUID2
CoSuspendClassObjects
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysFreeString
SysAllocString
VariantClear
hccutils
LoadSTRING
Sections
.text Size: 128KB - Virtual size: 127KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.srdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE