Static task
static1
Behavioral task
behavioral1
Sample
2745a6b55a82a373b2534a2657e98a63_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2745a6b55a82a373b2534a2657e98a63_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2745a6b55a82a373b2534a2657e98a63_JaffaCakes118
-
Size
316KB
-
MD5
2745a6b55a82a373b2534a2657e98a63
-
SHA1
cf10f56fb18f9635d9a709be9d123ce1814c67ad
-
SHA256
78e4f9ef7af93b7b5e70dd873bc0b4750bfaa4507563f15ab6f14d9f2800bd36
-
SHA512
0b7b27c65ba719a4abc51fcaccf12e606201561a2cc3d0b95b6fd75a7bc9e3b58be4028ce803efe832c668b78d01218a79676bac634c456875d605ac907e5e04
-
SSDEEP
6144:4lZ8y/TkMzmXkMjvTq1jv9LB/TTZ49cp18vtoGM4xD3lhgUGxoxGPQV:4l7KDHqJbl4Q182GMU3lexoxGPW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2745a6b55a82a373b2534a2657e98a63_JaffaCakes118
Files
-
2745a6b55a82a373b2534a2657e98a63_JaffaCakes118.exe windows:4 windows x86 arch:x86
013b6c5418a6f81454949a6372614e6f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
CopyFileExW
ExitProcess
IsDBCSLeadByteEx
GetThreadPriority
WriteConsoleOutputCharacterA
IsBadReadPtr
GetDiskFreeSpaceW
GlobalDeleteAtom
GetFileInformationByHandle
InitializeCriticalSection
ReleaseMutex
lstrcatW
GetCommandLineA
VirtualProtect
user32
InsertMenuA
SetKeyboardState
SetPropW
AppendMenuA
CreateDialogIndirectParamW
GetDoubleClickTime
IsMenu
SetClipboardData
CheckMenuItem
DestroyIcon
GetDC
CloseClipboard
SendDlgItemMessageW
GetShellWindow
PostThreadMessageW
CreateMenu
IntersectRect
ChangeMenuW
ScrollWindowEx
ReplyMessage
GetForegroundWindow
IsDlgButtonChecked
MsgWaitForMultipleObjects
IsCharAlphaNumericW
DefMDIChildProcW
SetRect
ToUnicodeEx
GetNextDlgTabItem
SetMenu
DeleteMenu
HideCaret
InSendMessage
SetForegroundWindow
RegisterClassW
GetDlgItem
CheckRadioButton
EnumWindowStationsA
CharLowerA
wsprintfW
GetMessageA
LoadKeyboardLayoutA
IsChild
ScreenToClient
DrawMenuBar
RemovePropW
EnumDesktopsW
SetPropA
SetWindowPlacement
SendMessageTimeoutA
DeferWindowPos
DestroyCursor
CreateAcceleratorTableW
ShowCursor
DialogBoxIndirectParamA
gdi32
GetTextExtentPoint32A
TextOutA
OffsetClipRgn
GetEnhMetaFileHeader
GetLayout
DeleteMetaFile
GetMetaFileBitsEx
StrokePath
CreatePen
GetDIBits
GetPixelFormat
GetRgnBox
SaveDC
GetTextExtentPointW
ExtSelectClipRgn
comdlg32
ChooseFontW
ChooseColorA
PageSetupDlgA
advapi32
SetSecurityDescriptorSacl
RegEnumKeyW
CryptVerifySignatureW
GetAclInformation
AllocateAndInitializeSid
AbortSystemShutdownW
DestroyPrivateObjectSecurity
SetSecurityDescriptorOwner
CryptSignHashW
CryptDestroyKey
GetAce
RegDeleteValueA
RegSetValueExW
SetEntriesInAclW
SetSecurityDescriptorGroup
RegEnumKeyExA
OpenEventLogW
OpenThreadToken
CryptGetUserKey
BuildTrusteeWithNameW
RegRestoreKeyW
OpenProcessToken
RegSetKeySecurity
CreateServiceA
RevertToSelf
GetSecurityInfo
ObjectCloseAuditAlarmW
GetFileSecurityA
AdjustTokenPrivileges
RegConnectRegistryW
MakeSelfRelativeSD
GetSecurityDescriptorDacl
SetKernelObjectSecurity
CryptGetKeyParam
RegQueryValueA
shell32
DragFinish
ole32
CoSwitchCallContext
OleBuildVersion
CoFreeUnusedLibraries
GetClassFile
oleaut32
SafeArrayUnaccessData
SysAllocStringLen
VariantChangeType
SafeArrayRedim
SafeArrayGetElement
SysStringLen
SafeArrayCreate
SafeArrayGetLBound
comctl32
_TrackMouseEvent
ImageList_GetImageInfo
ImageList_DragShowNolock
shlwapi
StrCpyW
PathGetDriveNumberA
PathFindNextComponentW
PathIsDirectoryW
StrCpyNW
StrCmpNIW
PathAppendA
SHSetThreadRef
StrChrIW
StrDupW
PathIsFileSpecW
PathRemoveBackslashA
SHCopyKeyW
PathAddBackslashW
setupapi
SetupDiClassGuidsFromNameW
SetupDiEnumDeviceInfo
SetupGetBinaryField
SetupOpenAppendInfFileA
SetupDiDestroyDeviceInfoList
SetupGetInfFileListA
Sections
.text Size: 296KB - Virtual size: 294KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE