Static task
static1
Behavioral task
behavioral1
Sample
26e40564412963905aab40a34ccf5b4d_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
26e40564412963905aab40a34ccf5b4d_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
26e40564412963905aab40a34ccf5b4d_JaffaCakes118
-
Size
120KB
-
MD5
26e40564412963905aab40a34ccf5b4d
-
SHA1
05831005b02479b51415b3249c0b39329a0c0ba5
-
SHA256
5859516cccb049e6797c78d2a1bdf914fd70c6ea0aedcddca4ecc694c25c6454
-
SHA512
33e995dffdb43282d5d6536b8c2c2890140b64aa1b292c147f1abe9b7b1e034087da4bb9a8facbc509b70b1086b155913692e1789b4f29de77b1db2857959d88
-
SSDEEP
3072:qSKxL6DaYxro9wnhCxU8h0SGy7DkrG36O/9i:axG5rswGh087DeVO/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 26e40564412963905aab40a34ccf5b4d_JaffaCakes118
Files
-
26e40564412963905aab40a34ccf5b4d_JaffaCakes118.exe windows:4 windows x86 arch:x86
e53010cf451899b0aaea306a7d9b3cd6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalShrink
MulDiv
OpenJobObjectW
ReadFile
HeapFree
SetEnvironmentVariableA
TlsGetValue
TryEnterCriticalSection
WaitForMultipleObjectsEx
HeapCreate
HeapAlloc
GlobalAlloc
GetVersionExA
GetTimeZoneInformation
GetTempPathW
GetSystemInfo
GetStringTypeExW
GetModuleHandleA
GetLogicalDriveStringsW
GetFileAttributesExA
GetExitCodeProcess
GetConsoleOutputCP
GetCommandLineA
ExitProcess
EraseTape
EndUpdateResourceA
DuplicateHandle
DeleteCriticalSection
CloseHandle
RemoveDirectoryW
BeginUpdateResourceA
ole32
CoUninitialize
CoFreeUnusedLibraries
IsEqualGUID
winmm
midiOutCacheDrumPatches
mmioDescend
mxd32Message
waveInGetDevCapsW
waveInGetNumDevs
waveInOpen
waveInReset
waveInStop
joyGetPos
waveOutUnprepareHeader
waveOutPrepareHeader
ws2_32
WSAGetLastError
WSAStringToAddressA
WSAUnhookBlockingHook
send
socket
connect
closesocket
WSAWaitForMultipleEvents
listen
dinput
DirectInputCreateW
user32
TranslateMessage
AdjustWindowRect
CharLowerBuffA
CharToOemA
CheckMenuItem
ClientToScreen
DefWindowProcA
DestroyWindow
DialogBoxIndirectParamW
DispatchMessageA
DrawFrame
EmptyClipboard
EnumDisplayMonitors
EnumWindowStationsA
GetForegroundWindow
GetTitleBarInfo
IsWindowEnabled
LoadIconA
MessageBeep
MessageBoxW
MsgWaitForMultipleObjects
OpenClipboard
PeekMessageA
RegisterShellHookWindow
RegisterWindowMessageA
UpdateWindow
UpdateLayeredWindow
version
VerQueryValueA
GetFileVersionInfoA
shell32
ShellExecuteA
SHGetSpecialFolderPathW
SHFileOperationW
advapi32
SetSecurityDescriptorDacl
AddAccessDeniedAce
CryptEncrypt
EqualSid
FileEncryptionStatusW
GetAce
GetAclInformation
GetLengthSid
GetTrusteeNameW
InitializeSecurityDescriptor
LsaClearAuditLog
LsaSetSecret
OpenProcessToken
OpenServiceA
QueryServiceConfig2A
RegOpenKeyA
RegOpenKeyExA
RegQueryValueExA
SystemFunction013
Sections
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ