Static task
static1
Behavioral task
behavioral1
Sample
74b1284375b92011014b93dda3b56d77_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
74b1284375b92011014b93dda3b56d77_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
74b1284375b92011014b93dda3b56d77_JaffaCakes118
-
Size
380KB
-
MD5
74b1284375b92011014b93dda3b56d77
-
SHA1
64a8647065528638efc430a0df4e67cc1608159c
-
SHA256
77d7e8f0ebf210a3d16f4f9a768ddbccb1dc121461a966cbbfb04036deef3b3f
-
SHA512
90df6d5b762603a02c55af33d77c45b414fe8b90320a94261b2f092eb8fa9159d43b7e45f5c0992e62a8d1d37cc21545ccb28facd2a5cfc05920c58089897719
-
SSDEEP
6144:sAoHZ+azbYMVsx/PaRs+4FEUqs6PbcFMRJ8lMuSM+gnktpcnlDrc9qda:lotoMSPakAPbcgJpMdnwWtrWIa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 74b1284375b92011014b93dda3b56d77_JaffaCakes118
Files
-
74b1284375b92011014b93dda3b56d77_JaffaCakes118.exe windows:4 windows x86 arch:x86
e412c48dbc17ceb60d8154ef161217a1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstChangeNotificationA
GetCompressedFileSizeA
SetConsolePalette
GetCurrentProcessId
SetInformationJobObject
GlobalFlags
SetDefaultCommConfigA
OpenWaitableTimerA
GetWindowsDirectoryA
UpdateResourceA
BeginUpdateResourceA
ConnectNamedPipe
GetConsoleTitleA
GetProfileIntA
GetEnvironmentVariableA
UnlockFileEx
lstrcpyA
LocalAlloc
IsBadStringPtrA
SetConsoleActiveScreenBuffer
GetNumberOfConsoleInputEvents
GetConsoleInputExeNameA
HeapSetInformation
CancelWaitableTimer
GetPrivateProfileSectionNamesW
GetNumberFormatA
GetFileTime
DeleteTimerQueueTimer
SetDllDirectoryA
MoveFileExA
GetProcessHeap
GlobalUnlock
ShowConsoleCursor
IsDebuggerPresent
VerifyVersionInfoA
VirtualProtectEx
DisconnectNamedPipe
WriteConsoleOutputA
ReadConsoleA
WriteConsoleOutputCharacterA
PeekConsoleInputA
OpenFileMappingA
ReleaseSemaphore
FileTimeToSystemTime
OpenProcess
GetDiskFreeSpaceExA
SetStdHandle
GetConsoleCursorMode
GetConsoleCursorInfo
HeapCreate
FileTimeToDosDateTime
TransactNamedPipe
DeleteTimerQueue
GetCurrentDirectoryA
GetVersionExA
GetSystemDefaultLangID
GetProcessShutdownParameters
GetComputerNameExA
_lclose
GetThreadLocale
IsSystemResumeAutomatic
WriteConsoleOutputAttribute
VirtualAllocEx
IsBadWritePtr
GetProcessVersion
LockResource
IsBadHugeWritePtr
GetCommandLineA
UnlockFile
GetVersion
GetCurrentDirectoryA
EnumTimeFormatsA
GetVolumeNameForVolumeMountPointA
GetProcessTimes
SizeofResource
HeapFree
GetConsoleCommandHistoryLengthA
GetDiskFreeSpaceA
GetTickCount
RemoveDirectoryA
SetThreadLocale
CreateNamedPipeA
SetProcessShutdownParameters
ReadConsoleOutputA
QueryPerformanceFrequency
UpdateResourceA
WriteConsoleA
GetTickCount
QueryDosDeviceA
ProcessIdToSessionId
_hwrite
GetShortPathNameA
GetCurrentThread
GetThreadSelectorEntry
SetTapeParameters
GetDllDirectoryA
GetTimeFormatA
LoadModule
GetExpandedNameA
EndUpdateResourceA
ReadConsoleInputA
EnumResourceTypesA
GetVolumeInformationA
GetDateFormatA
DisconnectNamedPipe
SetConsoleCursor
QueueUserWorkItem
GetProcessAffinityMask
GetEnvironmentStringsA
IsSystemResumeAutomatic
FindNextFileA
WaitNamedPipeA
WriteProcessMemory
LocalShrink
FlushFileBuffers
Thread32Next
OpenJobObjectA
ReadFileEx
ReadConsoleA
SetConsoleNumberOfCommandsA
GetTempPathA
MoveFileWithProgressA
GetVolumePathNameA
ClearCommError
GetEnvironmentStringsA
OpenProcess
AddConsoleAliasA
CloseHandle
IsValidCodePage
WriteConsoleA
WriteConsoleInputA
GetComputerNameA
GetConsoleTitleA
GetFullPathNameA
SetThreadAffinityMask
lstrcatA
MapViewOfFile
GetDiskFreeSpaceA
WinExec
GetThreadContext
GetLogicalDriveStringsA
GetPrivateProfileSectionNamesA
IsWow64Process
WaitForSingleObject
GetPrivateProfileIntA
GetDateFormatA
WaitForMultipleObjectsEx
GetDllDirectoryA
GetEnvironmentVariableA
SetEndOfFile
GetSystemInfo
DefineDosDeviceA
Heap32Next
GetProcessHandleCount
ClearCommBreak
GetProcessAffinityMask
OpenMutexA
GetVolumePathNamesForVolumeNameA
GetFullPathNameA
QueryMemoryResourceNotification
GetProcessPriorityBoost
SetMessageWaitingIndicator
GetStringTypeExA
PulseEvent
FindNextVolumeMountPointA
ExitProcess
FindResourceExA
SetSystemTimeAdjustment
DefineDosDeviceA
GetCommState
IsValidCodePage
SetConsoleFont
SetThreadUILanguage
user32
GetWindowTextA
DrawFrameControl
GetPriorityClipboardFormat
IsMenu
MessageBeep
GetTitleBarInfo
ModifyMenuA
DestroyCaret
SetMenuInfo
PaintDesktop
GetAltTabInfoA
DrawTextExA
BroadcastSystemMessageExA
IsWindowUnicode
GetKeyNameTextA
EndPaint
DrawIconEx
DeregisterShellHookWindow
EnableWindow
BeginDeferWindowPos
SetScrollInfo
GetWindowTextLengthA
LoadMenuIndirectW
MenuWindowProcA
RemovePropA
IsDialogMessageA
CharLowerBuffA
GetDCEx
GetWindowDC
ChangeDisplaySettingsExW
CopyIcon
CreateIconIndirect
GetClientRect
EnumPropsA
OpenIcon
GetMenuStringA
GetClipboardFormatNameA
SetScrollInfo
SetCursor
GetAltTabInfo
CallMsgFilter
SetDeskWallpaper
CloseWindow
GetDoubleClickTime
DlgDirSelectComboBoxExA
GetLayeredWindowAttributes
CheckDlgButton
GetOpenClipboardWindow
CharNextExA
BroadcastSystemMessageExA
UnregisterClassA
GetInputDesktop
MessageBoxExA
EnumPropsExW
GetWindowTextA
ShowCaret
RegisterClassExW
SetCursorPos
MonitorFromWindow
SetMenuContextHelpId
IsRectEmpty
GetWindowRgn
ToAsciiEx
DisableProcessWindowsGhosting
GetProcessDefaultLayout
DrawAnimatedRects
PackDDElParam
GetWindowInfo
GetMenuItemRect
SetShellWindowEx
CreateMDIWindowA
DefMDIChildProcA
CallMsgFilter
DefRawInputProc
GetDlgCtrlID
GetGUIThreadInfo
CopyIcon
GetClassNameA
GetMessageTime
KillTimer
GetGUIThreadInfo
InvertRect
PaintMenuBar
EndMenu
advapi32
DuplicateToken
Sections
.itext Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 188KB - Virtual size: 431KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 88KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ