Static task
static1
Behavioral task
behavioral1
Sample
7602e4c023bb56407b6475d39bbff0be_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7602e4c023bb56407b6475d39bbff0be_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7602e4c023bb56407b6475d39bbff0be_JaffaCakes118
-
Size
185KB
-
MD5
7602e4c023bb56407b6475d39bbff0be
-
SHA1
58d752212d65a7505dce9c843d66beb436ef3871
-
SHA256
504ce028e0d41b30b85135bcebbc63ab9f39a9a74f88ad46b144989ee25af5af
-
SHA512
73489085562dad442f0363e7a02ffcd882ee96780b3c1660c186aad4b562bd849d83b2e9728fa8f10e070ccfb90adf861faf3db9fcc67e2e1f87c9eb249f9426
-
SSDEEP
3072:+3mU5tKRx3YLqXxBRuU7GCuKcrgRoiSs6j6MdRTuOfy2xyDzYrtWlqLoyyQb0/IH:+2dpmqXkU7GnKc2omSLPfhxGzWtyq9jE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7602e4c023bb56407b6475d39bbff0be_JaffaCakes118
Files
-
7602e4c023bb56407b6475d39bbff0be_JaffaCakes118.exe windows:4 windows x86 arch:x86
12f4149f616986bcbe42e70f53c42b5e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyExW
RegQueryValueExW
RegCloseKey
RegDeleteKeyW
RegCreateKeyExW
RegDeleteValueW
RegEnumKeyExW
RegSetValueExW
kernel32
GetWindowsDirectoryW
GetFileAttributesW
GetFileTime
AttachConsole
GetTickCount
HeapFree
HeapAlloc
CreateDirectoryW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetCommandLineA
GetProcessHeap
RtlUnwind
RaiseException
HeapReAlloc
ExitProcess
HeapSize
FreeLibrary
GetProcAddress
LoadLibraryA
LoadLibraryW
GetTickCount
GetTempPathA
ResetEvent
WaitForSingleObject
SetEvent
Sleep
ReadFile
GetFileInformationByHandle
CreateFileA
VirtualAlloc
VirtualFree
SetFilePointer
FindNextFileW
CreateDirectoryA
GetFileSize
FindNextFileA
FindFirstFileA
GetExitCodeThread
TerminateThread
DeleteFileW
GetDiskFreeSpaceExW
GetVersionExA
lstrlenA
GetLocaleInfoA
lstrcatA
GetLocalTime
SystemTimeToFileTime
lstrlenW
lstrcatW
lstrcpyW
SetFileAttributesA
GetFileAttributesA
CopyFileA
SetFileAttributesW
GetFileAttributesW
CopyFileW
GetVersion
SetThreadPriority
GetCurrentThread
CreateEventA
WaitForMultipleObjects
DeleteFileA
CreatePipe
GetSystemInfo
GetTimeZoneInformation
FileTimeToSystemTime
OutputDebugStringA
lstrcpyA
GetFullPathNameA
GetFullPathNameW
IsDBCSLeadByte
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
CreateThread
InterlockedExchange
GetDiskFreeSpaceExA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
CreateSemaphoreA
ReleaseSemaphore
ExitThread
WritePrivateProfileStringA
GetPrivateProfileStringA
FileTimeToLocalFileTime
lstrcmpA
lstrcmpW
GlobalFree
GlobalUnlock
GlobalAlloc
GetACP
GetTempFileNameA
GetUserDefaultLCID
SetPriorityClass
GetThreadPriority
GetPriorityClass
GetCurrentProcess
RtlUnwind
GetCurrentThreadId
TlsSetValue
GetSystemTime
HeapFree
HeapAlloc
GetCPInfo
GetOEMCP
GetCommandLineA
RaiseException
TlsAlloc
TlsFree
SetLastError
TlsGetValue
ExitProcess
TerminateProcess
HeapReAlloc
HeapSize
LCMapStringA
LCMapStringW
GetModuleHandleA
UnhandledExceptionFilter
GetEnvironmentVariableA
HeapDestroy
HeapCreate
IsBadWritePtr
GetStringTypeA
GetStringTypeW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetUnhandledExceptionFilter
IsBadCodePtr
shell32
ShellExecuteExW
ShellExecuteW
SHFileOperationW
SHGetFolderPathW
comdlg32
GetSaveFileNameW
GetOpenFileNameW
CommDlgExtendedError
comctl32
InitCommonControlsEx
ddraw
DirectDrawCreateEx
DirectDrawCreate
pdh
PdhGetFormattedCounterValue
PdhCollectQueryData
PdhAddCounterW
PdhMakeCounterPathW
PdhLookupPerfNameByIndexW
PdhCloseQuery
PdhOpenQueryW
version
VerQueryValueW
GetFileVersionInfoW
GetFileVersionInfoSizeW
winmm
timeGetDevCaps
timeEndPeriod
timeBeginPeriod
timeGetTime
crypt32
CertVerifyCertificateChainPolicy
setupapi
SetupIterateCabinetW
oleaut32
CreateErrorInfo
DispInvoke
VarI2FromR4
SetErrorInfo
Sections
.text Size: 159KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 318B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ