Static task
static1
Behavioral task
behavioral1
Sample
28aa158f24e5c01f01ccd8f4380904e6_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
28aa158f24e5c01f01ccd8f4380904e6_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
28aa158f24e5c01f01ccd8f4380904e6_JaffaCakes118
-
Size
480KB
-
MD5
28aa158f24e5c01f01ccd8f4380904e6
-
SHA1
e106b3561f5852499b6b01fe49d05e1c75486d4a
-
SHA256
a8992a6eb3371e06ad124629423f4b7f907679f557dcaeaa1e9200bca1f41b50
-
SHA512
be978094264b39c63df9fb1a5e1e9a6f26c4cc5a664652a216c514982a291ae9764f64aa1bd98e7aea960afc9dd054d64da2c55b878ced02798e1bdf06ce1ffd
-
SSDEEP
12288:QVcPtfSM+d2RkA32xGKstkQ9FDElkb6rZhdfPVX9ziZLhr2QT0ocV:QlkO/ziZLhdTRc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 28aa158f24e5c01f01ccd8f4380904e6_JaffaCakes118
Files
-
28aa158f24e5c01f01ccd8f4380904e6_JaffaCakes118.exe windows:4 windows x86 arch:x86
518a00a06e537efa2b132b6a0b6981a9
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
RemoveDirectoryA
DeviceIoControl
GetVersionExA
CreateDirectoryA
GetWindowsDirectoryA
GetProcessHeap
GetFullPathNameA
FormatMessageA
GetShortPathNameA
GetLocaleInfoA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetEnvironmentStringsW
CreateEventA
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetFileType
SetHandleCount
GetStringTypeW
GetStringTypeA
GetStdHandle
ExitProcess
HeapReAlloc
CreateProcessA
VirtualFree
LCMapStringW
LCMapStringA
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetCPInfo
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RaiseException
GetDateFormatA
GetTimeFormatA
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
CreateThread
ExitThread
GetSystemTimeAsFileTime
RtlUnwind
SetEvent
GetSystemTime
ResumeThread
CopyFileA
TerminateThread
DeleteCriticalSection
GetFileTime
SetFileTime
SetEnvironmentVariableA
OutputDebugStringA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetEndOfFile
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetFileSize
GetCurrentDirectoryA
SetCurrentDirectoryA
FindFirstFileA
GetFileAttributesA
FlushFileBuffers
ReleaseMutex
CreateMutexA
TerminateProcess
OpenProcess
GetCurrentProcess
GetACP
GetComputerNameA
GetTimeZoneInformation
GetModuleHandleA
GetVolumeInformationA
HeapDestroy
HeapCreate
HeapFree
HeapAlloc
GetCurrentProcessId
GetCurrentThreadId
GetModuleFileNameA
InterlockedIncrement
lstrlenA
WideCharToMultiByte
VirtualAlloc
InterlockedDecrement
SetFileAttributesA
FindNextFileA
FindClose
WaitForSingleObject
Sleep
FreeLibrary
GetLastError
LoadLibraryA
GetProcAddress
LocalFree
MoveFileA
DeleteFileA
GetVersion
GetSystemDirectoryA
GetTickCount
MultiByteToWideChar
WriteFile
CreateFileA
ReadFile
SetFilePointer
CloseHandle
FreeEnvironmentStringsW
VirtualProtect
user32
PostThreadMessageA
KillTimer
DispatchMessageA
TranslateMessage
GetMessageA
SetTimer
GetCursorPos
wsprintfA
GetForegroundWindow
ExitWindowsEx
GetSystemMetrics
CreateDialogParamA
UpdateWindow
ShowWindow
IsWindow
EndDialog
PostQuitMessage
SetCursor
MessageBoxA
LoadStringA
DestroyWindow
LoadIconA
LoadCursorA
RegisterClassA
CreateWindowExA
PostMessageA
UnregisterClassA
GetPropA
SetPropA
DefWindowProcA
GetDC
ReleaseDC
gdi32
GetStockObject
GetDeviceCaps
advapi32
RegDeleteValueA
RegSetKeySecurity
RegOpenKeyExA
RegGetKeySecurity
RegCloseKey
GetTokenInformation
GetSecurityInfo
SetEntriesInAclA
SetSecurityInfo
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
GetUserNameA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegQueryValueExA
RegEnumValueA
DeregisterEventSource
CloseServiceHandle
OpenServiceA
OpenSCManagerA
StartServiceA
QueryServiceStatus
ControlService
SetServiceStatus
ReportEventA
RegisterEventSourceA
DeleteService
RegCreateKeyA
CreateServiceA
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
InitiateSystemShutdownA
RegConnectRegistryA
RegSetValueExA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
StringFromCLSID
CoInitialize
CoCreateInstance
CoInitializeEx
CoUninitialize
CoTaskMemFree
oleaut32
SysAllocStringLen
SysFreeString
SysAllocString
Sections
.text Size: 264KB - Virtual size: 263KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 392B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ