Static task
static1
Behavioral task
behavioral1
Sample
331f29213d0cb3fa7bf05b64a9d2867d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
331f29213d0cb3fa7bf05b64a9d2867d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
331f29213d0cb3fa7bf05b64a9d2867d_JaffaCakes118
-
Size
246KB
-
MD5
331f29213d0cb3fa7bf05b64a9d2867d
-
SHA1
d5d32008d231e4eb7cc1c12c8aff23179c5e8b41
-
SHA256
4365019b7daaaec84383af4a7ad6213e014f2b0529c3cec82810a8115fe37a9c
-
SHA512
109f33f241331a098174fe2d2b3e26256ee37746a56b986fcf6147e4bf55e57f94db4ca53aee73d5d655354039c6764b5699bc456a33cf95cee6c095fd3e6f2e
-
SSDEEP
3072:KsAFip1FWPL2tC846KlrHBvtZRCOPHRPDZfgIHOwxw+owOSFmaQiHUyoke7ah3TH:xx6PshKl1v3RPHRhfxw3wj4i0yonQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 331f29213d0cb3fa7bf05b64a9d2867d_JaffaCakes118
Files
-
331f29213d0cb3fa7bf05b64a9d2867d_JaffaCakes118.exe windows:4 windows x86 arch:x86
619be8ff33bd65a77d9d76a21b424267
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryExA
lstrcatW
lstrcmpW
QueryPerformanceFrequency
GetAtomNameW
ExitProcess
GetTempFileNameW
GetCurrentProcess
CreateMutexW
GetExpandedNameW
GetSystemDirectoryA
SetErrorMode
OpenWaitableTimerW
ReplaceFileW
GetLocalTime
SetUnhandledExceptionFilter
GetProcAddress
DosDateTimeToFileTime
GetWindowsDirectoryA
GlobalDeleteAtom
GetVolumeInformationA
lstrlen
IsBadWritePtr
CopyFileA
CreateSemaphoreA
LoadLibraryA
lstrcpynW
lstrcmpi
RaiseException
lstrcmpiW
HeapCreate
lstrcpy
EnumCalendarInfoA
SleepEx
OpenFile
user32
GetMenuStringA
GetMenuInfo
CreateDesktopW
SetWindowTextW
GetClassInfoW
GetDlgItemInt
WinHelpW
SendDlgItemMessageW
TrackPopupMenu
MessageBoxIndirectW
WaitForInputIdle
GetForegroundWindow
SetDlgItemTextW
CreateMenu
GetCapture
EnumWindows
CharNextW
MoveWindow
SetTimer
CharNextA
IsIconic
CreateDialogParamW
GetSystemMetrics
LoadMenuIndirectW
DialogBoxParamW
GetMenuStringW
IsWindowEnabled
IsMenu
RegisterClassW
GetMessageW
LoadMenuIndirectA
CharPrevW
CopyIcon
CheckMenuItem
gdi32
CreatePolyPolygonRgn
RemoveFontResourceExA
CreateFontIndirectA
SetWinMetaFileBits
SetMetaFileBitsEx
RemoveFontResourceExW
CreateColorSpaceA
CreateMetaFileW
StretchDIBits
advapi32
FlushTraceW
FileEncryptionStatusA
QueryServiceConfig2W
AccessCheckByTypeResultListAndAuditAlarmByHandleA
QueryServiceStatus
RegCreateKeyW
InitializeSid
RegSaveKeyExW
BuildImpersonateExplicitAccessWithNameW
SaferIdentifyLevel
IsTextUnicode
RegEnumKeyExW
IsWellKnownSid
WmiNotificationRegistrationA
EncryptedFileKeyInfo
CloseServiceHandle
shell32
StrCmpNW
SHGetDataFromIDListA
SHBrowseForFolder
StrRStrIW
ole32
CoCreateGuid
StringFromCLSID
CoDeactivateObject
CoGetCallerTID
CoDisconnectObject
inetcomm
HrGetLastOpenFileDirectory
MimeEditDocumentFromStream
EssSignCertificateDecodeEx
EssKeyExchPreferenceDecodeEx
MimeOleGetPropA
MimeOleCreateVirtualStream
MimeOleEncodeHeader
HrGetLastOpenFileDirectoryW
EssKeyExchPreferenceEncodeEx
MimeOleGetFileInfoW
MimeOleSetBodyPropW
sqlunirl
_GetKerningPairs_@12
_OpenSemaphore_@12
_CopyFileEx_@24
_CreateFont@56
_RegCreateKey_@12
_GetKeyboardLayoutName_@4
_GetPrivateProfileSection_@16
_GetTabbedTextExtent_@20
_GetUserObjectInformation_@20
_CallMsgFilter_@8
_GetTempPath_@8
_SHGetFileInfo_@20
_SendNotifyMessage_@16
_SetUserObjectInformation_@16
_CharNext_@4
_GetDateFormat_@24
wsock32
ioctlsocket
getsockopt
ntohl
SetServiceA
EnumProtocolsA
gethostbyname
GetNameByTypeW
accept
WSAAsyncGetServByPort
MigrateWinsockConfiguration
gethostname
getsockname
select
ntohs
WSApSetPostRoutine
WSASetBlockingHook
rcmd
WSACleanup
GetNameByTypeA
GetAddressByNameA
TransmitFile
WSAIsBlocking
Sections
.QkHgz Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.YkG Size: 2KB - Virtual size: 334KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ORHtgX Size: 2KB - Virtual size: 468KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.e Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vTo Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.usRxZG Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.anijq Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aPns Size: 17KB - Virtual size: 250KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tUEgGN Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ