Static task
static1
Behavioral task
behavioral1
Sample
2a17ee804303544a06fb9161f30d4acc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
2a17ee804303544a06fb9161f30d4acc_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
2a17ee804303544a06fb9161f30d4acc_JaffaCakes118
-
Size
328KB
-
MD5
2a17ee804303544a06fb9161f30d4acc
-
SHA1
37604afb75efd2790cf910d2d5a1cca844a24ed3
-
SHA256
b08e12df393371195cf12b8106d6c838d9357bc46b1a1842dfbd4bbbec9cc5e8
-
SHA512
bb61e49892462381a7dcc9bb3f41427be04f66ef523920aba6959089e0e02d5cf7cd2444fdd135b7f1936d17de24068af96eb3e50b444b4a9914756124fbe9b1
-
SSDEEP
6144:4r/ZoXhEueps2Praso2rXVI2b+QlPZ40PN9Vm4tdJG4yEBst01J0otgXCzZx:4raXGugzasPrVSmPo4tdJZRFzftg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a17ee804303544a06fb9161f30d4acc_JaffaCakes118
Files
-
2a17ee804303544a06fb9161f30d4acc_JaffaCakes118.exe windows:4 windows x86 arch:x86
de4f5e4b52cd325e5e1ec4a01686580b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameA
DebugBreak
_lread
GetEnvironmentVariableA
GetLocaleInfoW
TryEnterCriticalSection
HeapDestroy
CreateMutexW
WriteProfileStringA
LeaveCriticalSection
GetFileSize
GetModuleFileNameA
OutputDebugStringA
lstrcatA
SetCommBreak
ScrollConsoleScreenBufferW
GetPrivateProfileStringW
FlushConsoleInputBuffer
lstrcatW
GenerateConsoleCtrlEvent
SetProcessShutdownParameters
FindNextFileW
GetLogicalDrives
MoveFileA
FreeEnvironmentStringsA
CreateEventW
OutputDebugStringW
CloseHandle
CreateWaitableTimerA
IsProcessorFeaturePresent
ReleaseSemaphore
PeekConsoleInputW
TerminateProcess
GlobalReAlloc
GetCommandLineA
SetThreadExecutionState
SetHandleCount
FindResourceA
GetCommandLineW
OpenSemaphoreW
VirtualProtect
GetVersionExA
InterlockedCompareExchange
GetFileAttributesA
GetThreadContext
PeekConsoleInputA
IsDBCSLeadByteEx
OpenFileMappingA
EnumResourceTypesA
GetWindowsDirectoryW
PostQueuedCompletionStatus
GlobalFindAtomW
GetFileAttributesW
CreateMailslotA
_lcreat
CreateFileA
SetMailslotInfo
DefineDosDeviceA
GlobalSize
FindCloseChangeNotification
CompareStringA
GlobalDeleteAtom
IsBadReadPtr
SetHandleInformation
GetProcessHeap
DeleteCriticalSection
LocalFree
HeapSize
GetProfileStringW
LocalLock
CreateDirectoryExW
ReadConsoleOutputAttribute
WriteFileGather
SizeofResource
SetConsoleCtrlHandler
lstrcmpiW
GetCurrentThread
WritePrivateProfileStringW
GetThreadTimes
CreateMailslotW
GetCommState
SetTapeParameters
GetTimeFormatW
WriteConsoleOutputW
ScrollConsoleScreenBufferA
ReadFile
IsValidLocale
GetFileAttributesExA
UpdateResourceA
GetPrivateProfileStructA
ReadConsoleW
GetLocaleInfoA
GlobalHandle
CopyFileW
IsDebuggerPresent
FreeResource
GetProcessTimes
GetExitCodeThread
GetDiskFreeSpaceExW
ExitProcess
user32
DialogBoxParamW
EnumDisplaySettingsA
ClipCursor
GetLastActivePopup
CharLowerA
CharLowerBuffA
AttachThreadInput
SetClassLongA
ShowWindow
GetMenuItemInfoA
FlashWindow
GetMenuDefaultItem
CreateDialogParamW
ToUnicodeEx
GetMenuItemID
GetWindowWord
SetUserObjectInformationW
CreateDialogIndirectParamW
GetThreadDesktop
DestroyIcon
DrawFocusRect
GetIconInfo
GrayStringA
DrawStateA
SetWindowTextA
LoadStringW
LoadCursorW
CharUpperBuffW
GetFocus
ChangeMenuW
mouse_event
IsWindowVisible
EnumThreadWindows
VkKeyScanW
SetMessageQueue
PeekMessageA
GetDlgCtrlID
WaitMessage
FrameRect
GetKeyboardLayoutNameA
AppendMenuW
IsRectEmpty
GetDlgItemInt
RegisterWindowMessageW
gdi32
CreateEnhMetaFileA
CreateCompatibleDC
CreateDIBitmap
SetDIBColorTable
GetTextExtentPointW
PathToRegion
SaveDC
SetMapMode
FillPath
SetPixelFormat
GetStockObject
GetSystemPaletteUse
GetTextExtentExPointA
PolyDraw
CreateDCW
CreatePolyPolygonRgn
TextOutA
CopyEnhMetaFileA
comdlg32
GetFileTitleA
GetSaveFileNameW
advapi32
GetServiceDisplayNameW
LookupPrivilegeNameA
GetSecurityDescriptorGroup
SetSecurityDescriptorSacl
CryptVerifySignatureA
CryptSignHashW
SetEntriesInAclA
RegDeleteKeyW
OpenEventLogW
CryptDeriveKey
DestroyPrivateObjectSecurity
LockServiceDatabase
LookupAccountSidW
RegDeleteValueW
SetFileSecurityA
AbortSystemShutdownW
BuildTrusteeWithNameW
BuildTrusteeWithSidW
CryptGetProvParam
StartServiceA
SetNamedSecurityInfoW
MakeSelfRelativeSD
GetUserNameA
GetSecurityDescriptorControl
GetExplicitEntriesFromAclW
BuildSecurityDescriptorW
EnumDependentServicesA
EqualSid
SetFileSecurityW
GetCurrentHwProfileW
CryptEncrypt
CreateServiceA
CryptImportKey
SetTokenInformation
AddAce
ObjectCloseAuditAlarmA
shell32
SHAppBarMessage
SHGetFileInfoA
DragQueryFileA
ole32
PropVariantClear
CoGetClassObject
CoCreateFreeThreadedMarshaler
WriteFmtUserTypeStg
CoReleaseServerProcess
CoIsOle1Class
CoGetObject
IIDFromString
CoSetProxyBlanket
CreateILockBytesOnHGlobal
comctl32
ImageList_ReplaceIcon
shlwapi
PathAddBackslashW
PathRemoveArgsW
UrlCombineW
SHRegGetBoolUSValueA
PathRemoveFileSpecA
SHRegQueryUSValueW
PathFindOnPathW
StrFormatByteSizeA
StrCmpLogicalW
setupapi
SetupDiSetClassInstallParamsA
SetupDiGetDeviceRegistryPropertyW
Sections
.text Size: 304KB - Virtual size: 302KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE