Static task
static1
Behavioral task
behavioral1
Sample
27f86f6037cf593c9a5aaaecea9a9fbb_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27f86f6037cf593c9a5aaaecea9a9fbb_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
27f86f6037cf593c9a5aaaecea9a9fbb_JaffaCakes118
-
Size
496KB
-
MD5
27f86f6037cf593c9a5aaaecea9a9fbb
-
SHA1
cc55702c480b3699a99585732b760cdfa400b6a5
-
SHA256
03af2589e1deb6acbfaf9eb5424d7fa4a651b29bdbb9fdc9b57f5b41b935e4c1
-
SHA512
a6a088601fa455c2fa5999295fc8c10c2b7da675a311854f8940b517ee8fef42c0bbbacc32eeb3f01ac4e4ef1259a2cae347c01b43d31605183a0096b7716836
-
SSDEEP
12288:Ge/JdvO+KxCrXFDsjfx1JMR42kbvHkgBqZ8c8N0yG6/hdnZXY:IRCjSH2kjEgBqEZI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 27f86f6037cf593c9a5aaaecea9a9fbb_JaffaCakes118
Files
-
27f86f6037cf593c9a5aaaecea9a9fbb_JaffaCakes118.exe windows:4 windows x86 arch:x86
306f19bca194e3e62e74d917c0c891d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
netapi32
NetLocalGroupAdd
NetLocalGroupEnum
NetApiBufferFree
mfc71
ord1794
ord5613
ord2657
ord6090
ord6065
ord2370
ord2884
ord5833
ord1564
ord651
ord416
ord1486
ord1123
ord3667
ord3552
ord5071
ord5072
ord5070
ord4797
ord4617
ord4867
ord4844
ord4190
ord4213
ord4736
ord5211
ord4720
ord718
ord6067
ord3761
ord5895
ord6236
ord2164
ord519
ord1873
ord587
ord2086
ord1545
ord4232
ord3164
ord3441
ord266
ord304
ord265
ord4541
ord3683
ord1091
ord3255
ord334
ord5124
ord4108
ord3997
ord593
ord4038
ord4014
ord6278
ord3801
ord4326
ord2063
ord5583
ord3806
ord1010
ord5102
ord6219
ord5382
ord3832
ord1920
ord2931
ord5224
ord5226
ord3948
ord4568
ord5230
ord5213
ord5566
ord2838
ord4481
ord1467
ord2271
ord1489
ord299
ord2933
ord865
ord908
ord5563
ord5119
ord5975
ord1054
ord4035
ord2372
ord1482
ord2899
ord3430
ord5702
ord2427
ord3070
ord3553
ord3952
ord3684
ord5868
ord3210
ord1934
ord2368
ord3161
ord2367
ord1930
ord1280
ord2654
ord5641
ord2328
ord3592
ord1053
ord2018
ord6118
ord5419
ord4109
ord2272
ord3110
ord3830
ord2990
ord757
ord2248
ord566
ord2938
ord5731
ord3204
ord5403
ord2468
ord1979
ord4353
ord1916
ord709
ord5642
ord6037
ord501
ord6276
ord2324
ord1185
ord3576
ord2131
ord563
ord753
ord3401
ord1009
ord6005
ord5714
ord6006
ord5715
ord745
ord722
ord557
ord530
ord1425
ord5727
ord782
ord3850
ord1199
ord758
ord567
ord356
ord1096
ord5491
ord5235
ord5233
ord2390
ord2400
ord2398
ord2396
ord2392
ord2415
ord2403
ord300
ord3883
ord754
ord3328
ord2987
ord1598
ord1654
ord1063
ord741
ord572
ord3317
ord4261
ord2991
ord5214
ord4240
ord1402
ord5915
ord1591
ord2095
ord1903
ord4125
ord2371
ord385
ord2021
ord3088
ord630
ord1122
ord1084
ord605
ord4580
ord354
ord3182
ord4262
ord4486
ord3949
ord2644
ord3709
ord3719
ord3718
ord2533
ord2646
ord2540
ord2862
ord2714
ord4307
ord2835
ord2731
ord2537
ord5200
ord1599
ord1655
ord1656
ord1964
ord5175
ord1362
ord4967
ord3345
ord6277
ord3802
ord6279
ord1522
ord2172
ord2178
ord2405
ord2387
ord2385
ord2408
ord2413
ord2394
ord2410
ord934
ord930
ord932
ord928
ord923
ord5960
ord1600
ord4282
ord4722
ord3403
ord5203
ord4185
ord6275
ord5073
ord1908
ord5152
ord4244
ord1401
ord3946
ord1617
ord1620
ord5912
ord1551
ord1670
ord1671
ord2020
ord4890
ord4735
ord4212
ord5182
ord3641
ord781
ord784
ord911
ord2322
ord907
ord762
ord764
ord297
ord578
ord310
ord1187
ord1191
ord3423
ord1207
msvcr71
_itoa
_stricmp
_setmbcp
_exit
_XcptFilter
_ismbblead
_cexit
exit
_acmdln
_c_exit
_onexit
__dllonexit
??1type_info@@UAE@XZ
strtoul
_wcslwr
strcat
_mbsnbcpy
_mbsstr
_mbsrchr
strlen
_purecall
_strdup
_mbscmp
_stat
_findfirsti64
_findclose
_mbsicmp
_mbschr
memcpy
fseek
fgetpos
fread
memmove
_splitpath
_makepath
strcpy
sprintf
fopen
fwrite
fclose
atoi
??0exception@@QAE@XZ
??1exception@@UAE@XZ
_CxxThrowException
__CxxFrameHandler
??0bad_cast@@QAE@PBD@Z
??1bad_cast@@UAE@XZ
??0bad_cast@@QAE@ABV0@@Z
??0exception@@QAE@ABV0@@Z
_amsg_exit
__getmainargs
_initterm
memset
_except_handler3
free
malloc
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__security_error_handler
?terminate@@YAXXZ
_controlfp
kernel32
GetCurrentProcessId
InterlockedExchange
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
ExitProcess
GetStartupInfoA
GetModuleHandleA
lstrcatA
WinExec
lstrcpyA
GetWindowsDirectoryA
LockResource
FindResourceA
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
MultiByteToWideChar
WideCharToMultiByte
GetLastError
InitializeCriticalSection
DeleteCriticalSection
GetVersion
lstrcmpiA
lstrlenW
lstrlenA
LoadLibraryA
FreeLibrary
GetProcAddress
GetModuleFileNameA
GetSystemDefaultLangID
FindClose
FindFirstFileA
VerifyVersionInfoA
VerSetConditionMask
LocalFree
LocalAlloc
GetCurrentProcess
GetCurrentThread
ExpandEnvironmentStringsA
FormatMessageA
GetSystemTimeAsFileTime
LoadResource
user32
EnumChildWindows
GetDlgCtrlID
SetWindowTextA
IsWindowVisible
GetWindowLongA
GetClassNameA
GetWindowTextA
GetWindowPlacement
ShowWindow
MapDialogRect
GetCursorPos
KillTimer
SetTimer
MessageBeep
SetWindowLongA
CopyIcon
SetCursor
DestroyCursor
RedrawWindow
PtInRect
PostMessageA
ReleaseCapture
LoadCursorA
IsWindow
DestroyWindow
SetCapture
DrawStateA
ModifyMenuA
GetMenuItemID
GetMenuItemCount
GetSysColor
SystemParametersInfoA
LoadBitmapA
WindowFromPoint
GetParent
GetNextDlgTabItem
GetFocus
InvalidateRect
ReleaseDC
GetDC
ClientToScreen
GetClientRect
DrawFocusRect
DrawFrameControl
InflateRect
CopyRect
IsMenu
GetMenu
GetWindow
ExitWindowsEx
GetDesktopWindow
MessageBoxA
wsprintfA
PostQuitMessage
LoadIconA
SendMessageA
GetWindowRect
GetSystemMenu
AppendMenuA
OffsetRect
EnableWindow
DestroyIcon
GetSubMenu
gdi32
SetTextJustification
TextOutA
GetStockObject
GetObjectA
CreateFontIndirectA
GetTextExtentPoint32A
Rectangle
SelectObject
advapi32
InitializeAcl
RegOpenKeyExA
QueryServiceStatus
CloseServiceHandle
OpenServiceA
OpenSCManagerA
ControlService
RegCloseKey
RegQueryValueA
RegDeleteValueA
RegFlushKey
LookupPrivilegeValueA
AdjustTokenPrivileges
ImpersonateSelf
OpenThreadToken
OpenProcessToken
InitializeSecurityDescriptor
GetLengthSid
RegEnumValueA
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
AllocateAndInitializeSid
LookupAccountSidW
FreeSid
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
shell32
ShellExecuteA
ExtractIconExA
comctl32
ImageList_SetBkColor
ImageList_AddMasked
ImageList_GetImageInfo
ImageList_GetImageCount
ImageList_GetIcon
ord17
ImageList_ReplaceIcon
_TrackMouseEvent
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
SysFreeString
SysAllocStringLen
msvcp71
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBG@Z
??1_Lockit@std@@QAE@XZ
?_Register@facet@locale@std@@QAEXXZ
?_Incref@facet@locale@std@@QAEXXZ
?begin@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AViterator@12@XZ
?end@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE?AViterator@12@XZ
??$?9DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?_Getfacet@locale@std@@QBEPBVfacet@12@I@Z
??Bid@locale@std@@QAEIXZ
??0_Lockit@std@@QAE@H@Z
?_Getcat@?$ctype@G@std@@SAIPAPBVfacet@locale@2@@Z
??$?8DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??$?MDU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?id@?$ctype@G@std@@2V0locale@2@A
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@D@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?insert@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE?AViterator@12@V312@G@Z
??0locale@std@@QAE@XZ
?insert@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@IABV12@@Z
?compare@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEHIIPBG@Z
?compare@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEHIIABV12@@Z
?find_last_of@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEIPBGI@Z
?substr@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBE?AV12@II@Z
?insert@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@IPBG@Z
??4?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV01@PBG@Z
??$?MGU?$char_traits@G@std@@V?$allocator@G@1@@std@@YA_NABV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@0@0@Z
?at@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAGI@Z
?find@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEIPBGI@Z
??$?9DU?$char_traits@D@std@@V?$allocator@D@1@@std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?resize@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEXI@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@ABV01@@Z
??4?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?npos@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@2IB
?erase@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@II@Z
?is@?$ctype@G@std@@QBE_NFG@Z
??1locale@std@@QAE@XZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 280KB - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.srdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE