Static task
static1
Behavioral task
behavioral1
Sample
75960f7a26c278b4f9b38359e84f46c7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
75960f7a26c278b4f9b38359e84f46c7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
75960f7a26c278b4f9b38359e84f46c7_JaffaCakes118
-
Size
396KB
-
MD5
75960f7a26c278b4f9b38359e84f46c7
-
SHA1
c9f0bac426fd5352ab919994e97eb5ec60f76d1e
-
SHA256
477d7cdc0b8182113622a5adcdd1491b712e3bf1f6c180cc4e2948600edfb3d1
-
SHA512
9f1373b9a8c3bd1f613779be745c249f3347fbd4df2a19b68f81144b5468734266cc2d14e38517ac3adfa6c2228432254ab9b625acb03287242440b339d184e7
-
SSDEEP
6144:yD2r1GkidFap+xoT2tCfzDw1AEK1fsitR3mgJm+WCNmyd0mp:kYGkidJxjYME3glk0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 75960f7a26c278b4f9b38359e84f46c7_JaffaCakes118
Files
-
75960f7a26c278b4f9b38359e84f46c7_JaffaCakes118.exe windows:4 windows x86 arch:x86
8842a0a894ec7d6af7b02a65ad6b431e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
CM_Locate_DevNodeW
CM_Get_DevNode_Registry_PropertyW
SetupScanFileQueueW
SetupOpenInfFileW
SetupOpenFileQueue
SetupGetStringFieldW
SetupFindFirstLineW
SetupDiSetSelectedDriverW
CM_Get_DevNode_Status
SetupDiOpenDeviceInfoW
SetupDiOpenDevRegKey
SetupDiInstallDriverFiles
SetupDiGetDriverInstallParamsW
SetupDiGetDeviceRegistryPropertyW
SetupDiGetDeviceInstanceIdW
SetupDiGetDeviceInstallParamsW
SetupDiGetClassDevsW
SetupDiEnumDriverInfoW
SetupDiEnumDeviceInfo
SetupDiDestroyDeviceInfoList
SetupDiCreateDeviceInfoList
SetupDiBuildDriverInfoList
SetupCloseInfFile
SetupCloseFileQueue
SetupDiSetDeviceInstallParamsW
shell32
ShellExecuteExA
SHGetMalloc
SHGetFolderPathW
ole32
CoInitialize
CoTaskMemFree
CoUninitialize
CoTaskMemAlloc
kernel32
lstrlenW
lstrlenA
lstrcpynW
lstrcmpiW
lstrcmpW
WriteFile
WideCharToMultiByte
WaitForMultipleObjects
UnmapViewOfFile
UnhandledExceptionFilter
SystemTimeToFileTime
Sleep
SetFileTime
SetFilePointer
SetFileAttributesW
SetEvent
SetEndOfFile
ResetEvent
RemoveDirectoryW
ReleaseMutex
ReadFile
QueryPerformanceCounter
MultiByteToWideChar
MoveFileW
MapViewOfFile
LocalFree
LoadLibraryExW
LeaveCriticalSection
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
CloseHandle
CompareFileTime
CompareStringA
CompareStringW
CreateDirectoryW
CreateEventW
CreateFileW
CreateMutexW
CreateProcessW
CreateThread
DeleteCriticalSection
DeleteFileW
DisableThreadLibraryCalls
EnterCriticalSection
FindNextFileW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDriveTypeW
GetExitCodeProcess
GetExitCodeThread
GetFileSize
GetFileTime
GetFileType
GetLocalTime
GetLocaleInfoW
GetProcAddress
GetProcessHeap
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTickCount
GetUserDefaultLangID
GetVersionExW
GetVolumeInformationW
GlobalAlloc
GlobalFree
HeapAlloc
HeapFree
HeapReAlloc
InitializeCriticalSection
InterlockedCompareExchange
wininet
InternetQueryOptionA
InternetGetConnectedState
InternetCanonicalizeUrlW
InternetCrackUrlW
oleaut32
SysFreeString
SysAllocString
SysStringLen
VariantInit
VariantClear
VarR8FromI1
user32
GetKeyboardType
MsgWaitForMultipleObjects
PeekMessageW
GetActiveWindow
SendMessageW
TranslateMessage
ExitWindowsEx
CharUpperW
CharUpperA
CharNextW
CharLowerA
BlockInput
DispatchMessageW
PostMessageW
shlwapi
StrCmpIW
StrCmpW
StrRChrW
StrStrIW
StrToIntExW
UrlGetPartW
PathRemoveBackslashW
PathIsUNCW
PathIsRootW
PathIsRelativeW
PathFindExtensionW
PathStripToRootW
PathCompactPathA
StrChrW
crypt32
CryptHashPublicKeyInfo
CertGetCertificateContextProperty
Sections
.text Size: 300KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ