Static task
static1
Behavioral task
behavioral1
Sample
29969bdf3ff6f16827fff823d39cb95c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
29969bdf3ff6f16827fff823d39cb95c_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
29969bdf3ff6f16827fff823d39cb95c_JaffaCakes118
-
Size
324KB
-
MD5
29969bdf3ff6f16827fff823d39cb95c
-
SHA1
1e09a172def6aa4d822b784b343158ab33fb4652
-
SHA256
2720e8843a9e8c775d80ba80085146f600d61df0d3c1ae8bbbb5e42275701054
-
SHA512
438a5aa780c8434dbbecc8c6218e9fe56a18047b8a75324620bd9ea8ee3eb0e60368f6854c6ca3b690171e1effba7a4ba8ad58a9bd0f9567aa6926e6290031d0
-
SSDEEP
6144:ZzZu9WhR6RAWV4bLh0SZ+rEfgMRlx3A7VnMHi:LukDWAWV4bLhKUx3w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 29969bdf3ff6f16827fff823d39cb95c_JaffaCakes118
Files
-
29969bdf3ff6f16827fff823d39cb95c_JaffaCakes118.exe windows:4 windows x86 arch:x86
4d3c786659560b1f976b0c7b63f5c1ba
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PeekConsoleInputW
FindResourceExW
FlushFileBuffers
FormatMessageA
UnmapViewOfFile
GetVersionExA
GetCommandLineA
GetUserDefaultLangID
LeaveCriticalSection
EraseTape
GlobalAddAtomA
FindCloseChangeNotification
VirtualAllocEx
QueryDosDeviceA
ExitProcess
GlobalReAlloc
DosDateTimeToFileTime
GetLocaleInfoW
ReleaseMutex
RemoveDirectoryA
VirtualFree
SetConsoleCursorPosition
SetLastError
FileTimeToLocalFileTime
GetPrivateProfileStringW
CreateDirectoryA
ConnectNamedPipe
LoadResource
SetStdHandle
MoveFileExA
VirtualLock
VirtualProtect
GetShortPathNameA
OpenFile
user32
GetKeyboardLayout
CharNextExA
UpdateWindow
CharNextW
OemToCharBuffA
VkKeyScanA
LoadImageA
SetClassLongW
GetAncestor
InvertRect
GetInputState
MsgWaitForMultipleObjectsEx
SetFocus
GetMenuCheckMarkDimensions
OpenDesktopW
DrawEdge
InSendMessage
BeginDeferWindowPos
ChildWindowFromPoint
EndPaint
EnumDisplayDevicesA
DestroyMenu
GetWindowLongW
EnableMenuItem
MoveWindow
keybd_event
EnumWindowStationsW
ToUnicodeEx
SetWindowsHookExW
EnumDisplayMonitors
GetWindowRect
CreateMDIWindowW
LoadMenuIndirectW
DestroyIcon
RegisterClassExW
IsCharAlphaW
DispatchMessageW
DefFrameProcW
AdjustWindowRectEx
VkKeyScanW
GetWindowThreadProcessId
SetClipboardData
SetMessageQueue
GetKeyboardType
gdi32
GetDCOrgEx
RoundRect
CopyEnhMetaFileA
comdlg32
GetFileTitleW
ChooseColorA
advapi32
GetSidSubAuthorityCount
GetPrivateObjectSecurity
OpenServiceW
EqualSid
GetSecurityDescriptorControl
RegOpenKeyExA
GetFileSecurityA
ChangeServiceConfigW
SetTokenInformation
CreateProcessAsUserW
LogonUserA
RegLoadKeyA
CryptAcquireContextW
SetEntriesInAclA
AccessCheckAndAuditAlarmW
RegEnumValueW
RegSaveKeyW
DeleteAce
RegGetKeySecurity
CryptExportKey
shell32
SHAddToRecentDocs
SHBrowseForFolderA
Shell_NotifyIconW
ole32
CoReleaseMarshalData
OleCreateMenuDescriptor
OleFlushClipboard
OleCreate
CoLockObjectExternal
oleaut32
SafeArrayRedim
SysFreeString
comctl32
ImageList_DragMove
shlwapi
SHRegGetBoolUSValueW
StrCatBuffA
PathIsURLW
SHCopyKeyW
UrlGetPartW
StrCmpNA
PathGetCharTypeA
PathIsSameRootW
PathIsRootW
SHRegOpenUSKeyW
setupapi
SetupDiSetDeviceRegistryPropertyA
SetupGetStringFieldW
SetupOpenFileQueue
SetupPromptReboot
SetupFindFirstLineW
SetupDiDestroyDeviceInfoList
SetupDiEnumDriverInfoW
SetupInstallFromInfSectionW
SetupLogErrorA
SetupDiDestroyDriverInfoList
Sections
.text Size: 300KB - Virtual size: 299KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE