Static task
static1
Behavioral task
behavioral1
Sample
60ffd7c2900e810a688e729cd0797f5a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
60ffd7c2900e810a688e729cd0797f5a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
60ffd7c2900e810a688e729cd0797f5a_JaffaCakes118
-
Size
281KB
-
MD5
60ffd7c2900e810a688e729cd0797f5a
-
SHA1
530c0ad0bc6c17ab2a0ab89034f3b6069ecfd0e4
-
SHA256
90597516dca2ffea777eff705215a77e9a34d66c81b01339039ba6bed6a252dd
-
SHA512
7850fc07800db4ff525350afc234f7cc40724b70a11fdb555d069c42ba1383be9f568f27d27361b17207ffab503c7adbddfe49df640ad6d00a6d66fae94e46a0
-
SSDEEP
6144:+O3nbDJ0lWyQCFI+R+To4FeBwp6pTlzvKWT1bAQBxI4Bw/yrXZWv:+O3nbedFRIo4F9CGarJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 60ffd7c2900e810a688e729cd0797f5a_JaffaCakes118
Files
-
60ffd7c2900e810a688e729cd0797f5a_JaffaCakes118.exe windows:4 windows x86 arch:x86
32171322ba84a2ca27f7b655dc3645f0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryInfoKeyA
InitiateSystemShutdownA
CryptVerifySignatureA
CryptEnumProvidersW
RegRestoreKeyA
CryptImportKey
CryptGetDefaultProviderW
RegCreateKeyA
RegEnumKeyExA
LookupPrivilegeNameA
RegReplaceKeyW
RegOpenKeyA
RegEnumValueW
RegQueryValueExW
RegSetValueExW
LookupAccountSidW
StartServiceW
CryptDuplicateHash
DuplicateToken
RegEnumKeyW
user32
ToUnicode
DestroyMenu
GetClassNameW
GetKeyboardLayoutNameA
RegisterClassExA
ChangeMenuW
DdeUnaccessData
MessageBoxExW
GetParent
EnumWindows
ChangeDisplaySettingsW
MessageBoxW
GetClipboardFormatNameA
DialogBoxIndirectParamW
RegisterClassA
BlockInput
DefDlgProcW
CloseClipboard
TrackMouseEvent
LoadImageW
EnumChildWindows
GetWindowLongW
DestroyWindow
GetGuiResources
GetCursorInfo
CreateWindowExW
SetForegroundWindow
TileWindows
IsCharLowerW
ShowWindow
kernel32
IsBadWritePtr
LoadLibraryA
GetModuleHandleA
LCMapStringA
OpenMutexA
CreateProcessW
GetTimeFormatA
SetComputerNameW
SetStdHandle
GetModuleFileNameW
CloseHandle
GetModuleHandleW
EnumResourceNamesW
GetStartupInfoA
ReadConsoleA
GetEnvironmentStringsW
SetFilePointer
GetCommandLineW
GetCurrentProcessId
LeaveCriticalSection
GetACP
QueryPerformanceCounter
ReadFile
GetCommandLineA
GetVersionExA
VirtualAlloc
GetSystemInfo
CompareStringW
GetCurrentProcess
GetLocaleInfoA
EnterCriticalSection
SetHandleCount
GetDateFormatA
VirtualProtect
ExitProcess
InitializeCriticalSection
GetLocaleInfoW
GetProcAddress
TlsFree
GetExitCodeThread
CreateMutexA
EnumSystemLocalesA
SetEnvironmentVariableA
WriteFileEx
GlobalFlags
GetEnvironmentStrings
GetDiskFreeSpaceA
HeapReAlloc
GlobalReAlloc
UnhandledExceptionFilter
InterlockedExchange
VirtualQuery
FlushFileBuffers
GetTimeZoneInformation
TlsSetValue
HeapCreate
HeapSize
GetCurrentThread
CompareStringA
CreateToolhelp32Snapshot
MultiByteToWideChar
IsValidLocale
GetSystemTimeAsFileTime
GetStringTypeA
ReadFileEx
GetCurrentThreadId
TlsGetValue
RtlUnwind
HeapAlloc
GetComputerNameW
GetOEMCP
TerminateProcess
CreateNamedPipeW
WideCharToMultiByte
GetUserDefaultLCID
GetStartupInfoW
GetModuleFileNameA
GetLastError
GetFileType
IsValidCodePage
HeapDestroy
GetStdHandle
VirtualFree
GetTickCount
GetCPInfo
TlsAlloc
GetStringTypeW
FreeEnvironmentStringsA
FreeEnvironmentStringsW
IsBadReadPtr
LCMapStringW
SetLastError
HeapFree
WriteFile
DeleteCriticalSection
comctl32
InitCommonControlsEx
Sections
.text Size: 158KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ