Static task
static1
Behavioral task
behavioral1
Sample
2707bddc9bdf61e223b8cc9a8fc71581_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2707bddc9bdf61e223b8cc9a8fc71581_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2707bddc9bdf61e223b8cc9a8fc71581_JaffaCakes118
-
Size
352KB
-
MD5
2707bddc9bdf61e223b8cc9a8fc71581
-
SHA1
6f91707ea4e863e3677128c5f0a602720b363ade
-
SHA256
4b51c5c37852b689c1dc800da4019517c7b8b6f51e438003212ef022973d1b35
-
SHA512
1e2475859e98dbfad191725ba496b8055a469d3cdd04c32bbe8354edbdb5740f64245db611a0cc2a48dd99204186eefa5da63f67a67fb6479a5129553f931e25
-
SSDEEP
6144:3rbLuxXWZQtK871Sql5D0TlSSAEiVGziscKB+hm9nLb:3re8y0Q1jD0hS55VMB+hmx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2707bddc9bdf61e223b8cc9a8fc71581_JaffaCakes118
Files
-
2707bddc9bdf61e223b8cc9a8fc71581_JaffaCakes118.exe windows:4 windows x86 arch:x86
e6406185a3873462741738448d71ef83
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileIntA
SetEndOfFile
ClearCommBreak
EndUpdateResourceA
ScrollConsoleScreenBufferA
OutputDebugStringA
GetSystemTimeAdjustment
SetStdHandle
DosDateTimeToFileTime
GetSystemDirectoryW
_lread
GetStartupInfoA
FatalAppExitA
GetUserDefaultLangID
IsBadReadPtr
QueryDosDeviceA
GetBinaryTypeA
VirtualAllocEx
EnumResourceNamesA
GetLocaleInfoW
SetProcessShutdownParameters
GlobalUnlock
EnumResourceNamesW
MultiByteToWideChar
SetConsoleMode
VirtualLock
ReadFile
FormatMessageW
GetLongPathNameA
SetLastError
GetPrivateProfileSectionW
GetLargestConsoleWindowSize
AreFileApisANSI
PurgeComm
GetCPInfo
SetCommMask
SwitchToFiber
UnhandledExceptionFilter
FindFirstFileW
WriteProcessMemory
SetCurrentDirectoryA
FindNextChangeNotification
GlobalFlags
GetACP
GetPrivateProfileStringW
IsValidLocale
ReadConsoleOutputA
GetNumberFormatW
DebugBreak
GetTapeParameters
GenerateConsoleCtrlEvent
FindFirstFileA
ReleaseSemaphore
lstrcatW
DeleteCriticalSection
CreateMutexA
LoadLibraryExA
IsDBCSLeadByteEx
GetProcessTimes
WritePrivateProfileStringA
CreatePipe
VirtualQuery
MoveFileExA
LocalLock
GetFileAttributesExA
GetDiskFreeSpaceW
RemoveDirectoryA
GetAtomNameA
DeleteFiber
VirtualQueryEx
SetSystemTime
SetTimeZoneInformation
GetFullPathNameA
CreateFileW
EnumCalendarInfoW
OpenMutexA
lstrcmpA
FileTimeToLocalFileTime
CreateEventA
GetShortPathNameA
FindFirstFileExW
LocalSize
RaiseException
GetCurrentDirectoryW
GetUserDefaultLCID
GetFileType
OutputDebugStringW
FreeLibrary
lstrcpynA
lstrcmpiA
GetCommandLineA
GetVersionExA
VirtualProtect
GetTimeZoneInformation
ExitProcess
user32
ChangeMenuA
ExitWindowsEx
CreateWindowExA
GetAncestor
MessageBeep
IsCharUpperW
CopyIcon
CharLowerA
SetSysColors
ShowWindowAsync
UnregisterDeviceNotification
OffsetRect
CharToOemW
GetClassInfoExW
GetClipboardSequenceNumber
SetUserObjectInformationW
GetDlgItemTextW
DefFrameProcW
ToUnicodeEx
RegisterClipboardFormatA
CallWindowProcA
IsChild
gdi32
GetDIBColorTable
GetMapMode
SetTextJustification
CreateDiscardableBitmap
GetRegionData
CreateRectRgnIndirect
GetPixelFormat
TextOutW
GetNearestPaletteIndex
Polyline
RectVisible
GetTextExtentExPointW
GetDCOrgEx
DeleteObject
GetDIBits
GetGlyphOutlineA
CloseFigure
StartPage
CreateDIBPatternBrushPt
EnumFontFamiliesExA
CopyMetaFileA
comdlg32
PageSetupDlgA
GetSaveFileNameA
advapi32
InitiateSystemShutdownW
RegOpenKeyExA
ImpersonateNamedPipeClient
OpenThreadToken
GetUserNameW
ObjectCloseAuditAlarmA
CreateProcessAsUserA
GetSidSubAuthorityCount
CryptGenKey
GetUserNameA
ole32
CoReleaseMarshalData
StgSetTimes
CoLockObjectExternal
OleInitialize
CreateBindCtx
oleaut32
SafeArrayGetElement
LoadTypeLibEx
SafeArrayUnaccessData
SysAllocStringLen
SetErrorInfo
SysFreeString
comctl32
CreatePropertySheetPageW
ImageList_GetBkColor
ImageList_AddMasked
shlwapi
StrRetToStrW
SHCopyKeyA
PathStripToRootA
PathIsUNCW
SHGetValueW
StrTrimW
StrStrIW
StrCatBuffA
PathGetCharTypeW
StrCatW
setupapi
SetupDiBuildDriverInfoList
SetupCommitFileQueueA
Sections
.text Size: 316KB - Virtual size: 312KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE