Static task
static1
Behavioral task
behavioral1
Sample
304dcc445a88ebbe5f929d7c2e546146_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
304dcc445a88ebbe5f929d7c2e546146_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
304dcc445a88ebbe5f929d7c2e546146_JaffaCakes118
-
Size
344KB
-
MD5
304dcc445a88ebbe5f929d7c2e546146
-
SHA1
2e1313071984c8a73997778962cbacc2ff8d8efd
-
SHA256
33b93777f0db8c195d9a9e52c7442bd98376cfcac4d929912dc6155cdcfd550e
-
SHA512
4c458bf109a06bf382bca765c2181c15758fd6921d4192d9ee660707ca5eefdb68b1bb5fd028755f33cc1628c0630572ada0d8c258f411c366def8d31c67b4d0
-
SSDEEP
6144:7bjy2rtepz+IIuN3cg7O8P2TAOjKYmS1jdfhSf21a/qE6I:7bW3PIuNR7v+T4DS1dhSf2UyE6I
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 304dcc445a88ebbe5f929d7c2e546146_JaffaCakes118
Files
-
304dcc445a88ebbe5f929d7c2e546146_JaffaCakes118.exe windows:5 windows x86 arch:x86
e05d1da6c9f91d57bfa78748e763faf4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
GetConsoleAliasA
SetFilePointer
GetModuleFileNameA
GetEnvironmentStringsW
GetConsoleCP
GetConsoleMode
LCMapStringW
EnumResourceTypesA
SetStdHandle
CreateProcessA
HeapReAlloc
CompareStringW
SetEnvironmentVariableW
FlushFileBuffers
WriteConsoleW
GetTimeZoneInformation
SetEnvironmentVariableA
HeapSize
LoadLibraryW
VirtualProtect
lstrcmpiW
LoadLibraryExA
LocalHandle
UnmapViewOfFile
WideCharToMultiByte
SetNamedPipeHandleState
LoadResource
GetVersionExA
WritePrivateProfileSectionW
TryEnterCriticalSection
PeekConsoleInputW
EnumCalendarInfoExW
GetConsoleAliasesLengthW
Heap32ListNext
FindNextChangeNotification
Heap32First
GetTimeFormatA
OpenSemaphoreW
AssignProcessToJobObject
QueryPerformanceCounter
GetCurrentConsoleFont
FreeEnvironmentStringsW
GetFileAttributesW
CreateProcessW
CloseHandle
WaitForSingleObject
GetExitCodeProcess
RaiseException
HeapCreate
CreateFileW
MultiByteToWideChar
SetErrorMode
InterlockedDecrement
InterlockedIncrement
HeapAlloc
GetCurrentDirectoryW
GetLastError
ExitThread
GetCurrentThreadId
CreateThread
GetLocalTime
GetCommandLineA
HeapSetInformation
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
RtlUnwind
VirtualQuery
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetProcAddress
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileInformationByHandle
PeekNamedPipe
HeapFree
GetFileAttributesA
IsProcessorFeaturePresent
GetStringTypeW
ReadFile
Sleep
GetUserDefaultLCID
GetLocaleInfoW
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
ExitProcess
WriteFile
GetModuleFileNameW
user32
DialogBoxIndirectParamW
UserHandleGrantAccess
GetWindowRect
SetMenuItemBitmaps
EnumDesktopWindows
ChangeDisplaySettingsW
UnhookWindowsHook
GetScrollRange
WINNLSEnableIME
DispatchMessageA
ReleaseCapture
GetSystemMetrics
MapDialogRect
SendIMEMessageExW
GetShellWindow
CharToOemA
GetClipboardOwner
GetMenuItemRect
OemToCharA
DdeUnaccessData
SystemParametersInfoW
RedrawWindow
GetListBoxInfo
gdi32
SetBrushOrgEx
GetTextFaceW
AbortPath
SetSystemPaletteUse
GetRegionData
SetArcDirection
AnimatePalette
SetMiterLimit
GetEnhMetaFileDescriptionW
GetCharWidthI
GetClipRgn
PlayMetaFile
OffsetWindowOrgEx
SetMagicColors
StartDocW
CreateColorSpaceA
SetTextJustification
GetDCPenColor
PolyPatBlt
GdiDeleteSpoolFileHandle
comdlg32
ChooseFontA
ChooseFontW
advapi32
CryptSetProviderA
AddUsersToEncryptedFile
ElfDeregisterEventSource
SetSecurityDescriptorDacl
ObjectOpenAuditAlarmW
CryptContextAddRef
GetEffectiveRightsFromAclA
SetServiceStatus
GetTrusteeNameW
CryptSignHashA
ConvertToAutoInheritPrivateObjectSecurity
LsaLookupPrivilegeDisplayName
BuildSecurityDescriptorW
SystemFunction025
AllocateAndInitializeSid
ole32
OleConvertIStorageToOLESTREAM
CoGetCurrentLogicalThreadId
OleSetClipboard
winspool.drv
AddPrinterDriverA
FindNextPrinterChangeNotification
AddPrinterW
EnumPrinterDataExA
ord203
Sections
.text Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ