Static task
static1
Behavioral task
behavioral1
Sample
6ff865ac89ccb5d3934bfe8036d8eb6a_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6ff865ac89ccb5d3934bfe8036d8eb6a_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
6ff865ac89ccb5d3934bfe8036d8eb6a_JaffaCakes118
-
Size
432KB
-
MD5
6ff865ac89ccb5d3934bfe8036d8eb6a
-
SHA1
a1592c5b8e68459aa3d6eaf00c5f3d913c18bb8f
-
SHA256
8883a7db7b5113beccd944559c5acc299eff94d801c397d2c6061762aee03b8a
-
SHA512
4fc9abc3e8ab4d9a49203086b0cb169495e692a922d101acb51bd5e0fdf86f1882b322237b305a719399063710dbc7851c598a6961ee657cf4c0b1e109b1fb75
-
SSDEEP
12288:CBapw/E9WuuGKkHyg0QFJlPR106O+ARW0m:CBV/ElqQ10OZq6Fh0m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 6ff865ac89ccb5d3934bfe8036d8eb6a_JaffaCakes118
Files
-
6ff865ac89ccb5d3934bfe8036d8eb6a_JaffaCakes118.exe windows:5 windows x86 arch:x86
e790b09cbb8286b0f113b4472bac68d0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shlwapi
StrStrA
StrChrA
StrStrIA
kernel32
lstrcmpA
AllocConsole
GetStdHandle
WriteFile
WriteConsoleA
ReadFile
ReadConsoleA
MultiByteToWideChar
HeapFree
lstrcmpiA
WideCharToMultiByte
HeapAlloc
SetConsoleMode
GetConsoleMode
GetLastError
GetModuleFileNameA
ExitProcess
Sleep
CreateThread
GetTimeFormatA
CloseHandle
CreateFileA
SizeofResource
LockResource
LoadResource
lstrlenA
CreateDirectoryA
GetFileAttributesA
GetSystemDefaultLCID
GetModuleHandleA
ReadConsoleInputA
lstrcatA
WaitForSingleObject
SetConsoleCursorPosition
FillConsoleOutputCharacterA
GetConsoleScreenBufferInfo
PeekNamedPipe
lstrlenW
CreateProcessA
DuplicateHandle
GetCurrentProcess
CreatePipe
GetVersion
GetExitCodeProcess
TerminateProcess
GetTickCount
SetCurrentDirectoryA
DeleteFileA
ExpandEnvironmentStringsA
GetCurrentDirectoryA
GetTempPathA
lstrcmpW
GetCommandLineA
GetProcessHeap
RemoveDirectoryA
lstrcatW
lstrcpyA
FindResourceA
user32
CharToOemA
GetForegroundWindow
IsCharAlphaNumericA
CharLowerA
DialogBoxParamA
GetParent
GetDesktopWindow
GetWindowRect
CopyRect
OffsetRect
SetWindowPos
LoadStringA
SetDlgItemTextA
GetDlgItem
SetFocus
GetDlgItemTextA
EndDialog
wsprintfA
MessageBoxA
advapi32
RegCloseKey
RegQueryValueExW
RegOpenKeyExA
RegEnumKeyExA
RegQueryValueExA
ole32
CoInitialize
CoUninitialize
CoGetObject
CLSIDFromProgID
CoCreateInstance
oleaut32
VarBstrFromCy
VarBstrFromR4
VarBstrFromR8
VarBstrFromDec
SafeArrayUnaccessData
LoadTypeLi
SysFreeString
VariantInit
SysAllocString
DispInvoke
DispGetIDsOfNames
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
SafeArrayGetDim
SysStringLen
VariantTimeToSystemTime
Sections
.text Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 363KB - Virtual size: 362KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ