Static task
static1
Behavioral task
behavioral1
Sample
327161aec2b395e14cbd9f216bfc65b2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
327161aec2b395e14cbd9f216bfc65b2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
327161aec2b395e14cbd9f216bfc65b2_JaffaCakes118
-
Size
458KB
-
MD5
327161aec2b395e14cbd9f216bfc65b2
-
SHA1
2e56c0163594eb5cbf0a195504baada636cb8058
-
SHA256
bd26cb6a6d87cae23c5ed190c16a5fbc80d6258819e3b72329c29de1bb4926c9
-
SHA512
2762978511a148c59daa136b0db867e5b1196a4e1c1cb5287e5a32ee9556a0cd0093b8c6dfc91434de44e4c3df13eb32ddedd9faf1ffbff831ebfdda9c456039
-
SSDEEP
6144:QD4xxj4TEOTWtLv1Jg16rt3h6lAm/9rMreF8y0+8mdRbiW6Y6CtVGsZ2dQVvfDHO:C4xxj7hiG3WrVg08y0+8yz2s/XD8hQA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 327161aec2b395e14cbd9f216bfc65b2_JaffaCakes118
Files
-
327161aec2b395e14cbd9f216bfc65b2_JaffaCakes118.exe windows:4 windows x86 arch:x86
b13a28523462d3db9b2f8a1907161749
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
LookupPrivilegeNameA
InitializeSecurityDescriptor
RegReplaceKeyA
RegCreateKeyExW
CryptDecrypt
RegCreateKeyA
RegOpenKeyA
RegEnumValueA
RegSetValueA
CryptSetKeyParam
RegEnumKeyW
LookupAccountSidW
gdi32
CombineRgn
GetSystemPaletteEntries
EndPath
FixBrushOrgEx
GetTextExtentExPointA
DeleteDC
TextOutW
PolylineTo
GetCharABCWidthsW
CancelDC
GdiPlayDCScript
ResetDCA
GetROP2
EnumFontFamiliesExA
BitBlt
SelectClipRgn
CreateRectRgn
RemoveFontResourceW
SetPixel
SetArcDirection
GdiPlayScript
GetTextCharacterExtra
PolyPolyline
GetDeviceGammaRamp
shell32
FindExecutableW
kernel32
GetTickCount
GetCurrentProcessId
GetCurrentProcess
FreeLibrary
GetStringTypeA
HeapDestroy
SetConsoleCursorInfo
FreeEnvironmentStringsA
TlsAlloc
GetStdHandle
SetSystemTime
GetTimeZoneInformation
LeaveCriticalSection
InitializeCriticalSection
HeapSize
CreateSemaphoreW
WriteFile
TlsGetValue
GetStringTypeW
ExitProcess
RtlUnwind
DeleteCriticalSection
HeapFree
ReleaseSemaphore
GetACP
GetSystemTimeAsFileTime
GetCurrentThreadId
TerminateProcess
WideCharToMultiByte
QueryPerformanceCounter
EnterCriticalSection
FindFirstFileW
DuplicateHandle
IsValidCodePage
GetLastError
VirtualAlloc
CompareStringA
GetProcessHeap
GetDateFormatA
SetLastError
IsValidLocale
TransmitCommChar
GetModuleHandleA
HeapCreate
VirtualQuery
Sleep
UnhandledExceptionFilter
TlsFree
GetOEMCP
LoadLibraryA
GetFileType
GetLocaleInfoW
GetModuleFileNameA
GetEnvironmentStrings
SetHandleCount
GetEnvironmentStringsW
GetStartupInfoA
GetTimeFormatA
GetLocaleInfoA
InterlockedIncrement
SetEnvironmentVariableA
CompareStringW
FreeEnvironmentStringsW
GetUserDefaultLCID
TlsSetValue
GetVersionExA
LCMapStringW
LCMapStringA
HeapReAlloc
SetUnhandledExceptionFilter
GetProcAddress
GetCommandLineA
VirtualFree
EnumSystemLocalesA
InterlockedExchange
GetConsoleScreenBufferInfo
HeapAlloc
IsDebuggerPresent
MultiByteToWideChar
GetCPInfo
SetConsoleCtrlHandler
EnumResourceNamesW
GlobalDeleteAtom
GetCurrentThread
InterlockedDecrement
user32
GetCapture
DestroyCursor
DrawFrameControl
RemoveMenu
SetClipboardData
DispatchMessageA
LoadKeyboardLayoutA
VkKeyScanExW
ExcludeUpdateRgn
CloseWindowStation
TrackPopupMenuEx
CreateDesktopW
IsCharAlphaA
InsertMenuW
IsCharAlphaNumericW
ExitWindowsEx
CharNextW
ModifyMenuW
InvalidateRgn
SetCaretBlinkTime
wininet
InternetConnectW
InternetOpenW
Sections
.text Size: 156KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 281KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ