Static task
static1
Behavioral task
behavioral1
Sample
38877b8c5f9c38b8b7b9b28fd2357637_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
38877b8c5f9c38b8b7b9b28fd2357637_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
38877b8c5f9c38b8b7b9b28fd2357637_JaffaCakes118
-
Size
234KB
-
MD5
38877b8c5f9c38b8b7b9b28fd2357637
-
SHA1
0ce9efe04d57eb7b8dff8c892755037f3c066326
-
SHA256
3f1aafb5f83055eebacdc928633a5ead20a0bb2c81ba16b8757ab44b20de94a6
-
SHA512
43b54d432b82124b1f9ca4c053c90a05eba14385e8785d8eb6f428ed96cfc6f6f2d3871eb0c13ca31286d5d634464d7b684d975d7d9ae252878e4980ad250bc0
-
SSDEEP
3072:IoiEH2Rx+H/wKXjyMkbyUtqHQveAqtPZu3cebYHRnXU4Mq/feS1wBwzsTG:yRx+fwKTydxemcZQcefqHewMlT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 38877b8c5f9c38b8b7b9b28fd2357637_JaffaCakes118
Files
-
38877b8c5f9c38b8b7b9b28fd2357637_JaffaCakes118.exe windows:4 windows x86 arch:x86
5db8f8dbc3fa2edacf3445d9923a557f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
hccutils
LoadSTRING
InitializeKeyHook
FindResources
LoadSTRINGFromHKCU
kernel32
GetProcAddress
GetModuleHandleA
CreateProcessA
FreeLibrary
LoadLibraryA
GetVersionExA
CloseHandle
GetLastError
InterlockedDecrement
SearchPathA
CompareFileTime
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
lstrcmpiA
InterlockedIncrement
GetModuleFileNameA
IsDBCSLeadByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetWindowsDirectoryA
Sleep
CreateMutexA
GetCurrentThreadId
GetCommandLineA
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
FlushFileBuffers
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetStdHandle
WriteFile
HeapCreate
HeapDestroy
ExitProcess
LCMapStringW
LCMapStringA
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetOEMCP
GetCPInfo
GetStartupInfoA
HeapReAlloc
VirtualQuery
GetSystemInfo
VirtualProtect
RtlUnwind
SetFilePointer
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetLastError
IsDebuggerPresent
SetUnhandledExceptionFilter
CreateFileA
UnhandledExceptionFilter
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
TerminateProcess
LocalFree
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetThreadLocale
InterlockedExchange
GetACP
GetLocaleInfoA
user32
GetKeyboardLayout
MapVirtualKeyA
GetKeyNameTextA
LoadCursorA
GetClassInfoExA
SetWindowLongA
RegisterClassA
CreateWindowExA
GetMessageA
DispatchMessageA
PeekMessageA
RegisterClassExA
CreateDialogParamA
ShowWindow
PostQuitMessage
DefWindowProcA
RegisterHotKey
GetDlgItem
GetDesktopWindow
GetWindowRect
SetWindowTextA
SendMessageA
PostThreadMessageA
CharNextA
MessageBoxA
GetCursorPos
GetWindowLongA
EnumDisplaySettingsA
wsprintfA
UnregisterClassA
CallWindowProcA
DestroyWindow
UnregisterHotKey
IsWindow
advapi32
RegSetValueExA
RegQueryInfoKeyA
RegDeleteValueA
RegEnumKeyExA
RegDeleteKeyA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteExA
ole32
CoRevokeClassObject
CoRegisterClassObject
CoCreateInstance
CoTaskMemFree
CoSuspendClassObjects
StringFromGUID2
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysAllocString
SysFreeString
VariantClear
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE