Static task
static1
Behavioral task
behavioral1
Sample
365a6cb55f98f456a95e4a01898875e2_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
365a6cb55f98f456a95e4a01898875e2_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
365a6cb55f98f456a95e4a01898875e2_JaffaCakes118
-
Size
42KB
-
MD5
365a6cb55f98f456a95e4a01898875e2
-
SHA1
41f5ff86a87987713e23d8757449ebe69123a7d1
-
SHA256
c3f7f5bda98a409c018aed4b973e03292ef30b48c397ff62e6203e60a2ae77c2
-
SHA512
02fb8658e232610f3d219d2cd26ef4006b1a081913dc5364799be9cd5f09463c67a538fca2720e81cd8bd185ab6f6a33fcda59de452e3a0383d81969c6bbc829
-
SSDEEP
768:we+uKFQp6EZnVrR5oCPKbZstAEH1Y+vR7QO+daifZ:/gQAEDl5onbatvVPJ/Mx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 365a6cb55f98f456a95e4a01898875e2_JaffaCakes118
Files
-
365a6cb55f98f456a95e4a01898875e2_JaffaCakes118.exe windows:5 windows x86 arch:x86
c98d864f18a199402132e0a3741f36a6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MultiByteToWideChar
lstrlenW
FlushInstructionCache
RaiseException
GetStringTypeExA
GetShortPathNameA
SetThreadLocale
FindFirstFileA
GetLastError
SetLastError
lstrcmpiA
GetThreadLocale
GetProcAddress
EnterCriticalSection
GetTempFileNameA
FindClose
LoadLibraryA
LockResource
CreateEventW
GetModuleFileNameA
FindNextFileA
GetModuleHandleA
LoadLibraryExA
VirtualProtect
OpenEventW
DeleteCriticalSection
GetCurrentThreadId
GetVersionExA
CloseHandle
GetTempPathA
GetSystemTime
DeleteFileA
GetLocaleInfoA
GetEnvironmentVariableA
GetStringTypeA
LCMapStringW
LCMapStringA
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetStdHandle
ExitProcess
GetSystemDirectoryA
ReadFile
IsDBCSLeadByte
GetExitCodeProcess
GetFileAttributesA
LeaveCriticalSection
SizeofResource
GetVolumeInformationA
WideCharToMultiByte
FindResourceExA
InitializeCriticalSection
WriteFile
GetWindowsDirectoryA
GetTickCount
SetEvent
WaitForSingleObject
GetUserDefaultLCID
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
LoadResource
FreeLibrary
lstrlenA
FreeResource
lstrcmpA
FindResourceA
GetFileSize
CreateFileA
Sleep
HeapReAlloc
HeapCreate
GetStartupInfoA
GetCommandLineA
VirtualQuery
GetSystemInfo
GetModuleHandleW
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
GetComputerNameA
GetStringTypeW
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
user32
DialogBoxParamA
SetDlgItemTextA
EnableWindow
UpdateWindow
MapWindowPoints
LoadImageA
SetWindowTextA
GetWindow
CallWindowProcA
GetWindowTextA
ClientToScreen
SetCursor
GetMessageA
SetTimer
ScreenToClient
GetWindowRect
LoadStringA
GetParent
CharNextA
GetClientRect
GetWindowTextLengthA
SendMessageA
UnregisterClassA
SetWindowLongA
MessageBoxA
InvalidateRect
CharLowerA
GetWindowLongA
GetDlgItem
EndDialog
DefWindowProcA
RedrawWindow
GetSysColor
SetWindowPos
LoadStringW
CheckDlgButton
IsDlgButtonChecked
GetActiveWindow
PostMessageA
wvsprintfA
SystemParametersInfoA
GetSystemMetrics
gdi32
SetTextColor
CreateFontIndirectA
DeleteObject
GetObjectA
GetStockObject
CreateSolidBrush
advapi32
RegCreateKeyExA
CloseServiceHandle
CreateWellKnownSid
RegCloseKey
GetUserNameA
OpenSCManagerA
RegDeleteValueA
LsaClose
RegQueryInfoKeyA
RegOpenKeyExA
OpenServiceA
ChangeServiceConfigA
RegEnumKeyExA
RegDeleteKeyA
LsaAddAccountRights
RegQueryValueExA
RegSetValueExA
GetTokenInformation
LsaOpenPolicy
OpenProcessToken
shell32
ShellExecuteExA
ShellExecuteA
ole32
StringFromGUID2
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoInitialize
CoCreateInstance
oleaut32
VarUI4FromStr
comctl32
InitCommonControlsEx
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
Sections
.rdata Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 98KB - Virtual size: 101KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ