Static task
static1
Behavioral task
behavioral1
Sample
767436440984d0f874668905326f87d6_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
767436440984d0f874668905326f87d6_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
767436440984d0f874668905326f87d6_JaffaCakes118
-
Size
1.6MB
-
MD5
767436440984d0f874668905326f87d6
-
SHA1
1dd4686bcad101ea367ac4f774d5dd40b756f05c
-
SHA256
0bb01667c203f8b86cbc74c9916a9b198786eb121b24962eb9194861a0d735db
-
SHA512
c96bab24a09ae22c0c52d7b3cf0ff3aac6ea58ffff2b3bac2782b94062afe9d58cfb985fca84520bbd8b051769145cad966ef528c6298b1dbd9bc84fe5e52fd2
-
SSDEEP
49152:5qVfaCXqm84VG2MZRdE42f8oIwR0MDoMPzVINI:5qVfPqmtG2QeEoIwmMDBPzd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 767436440984d0f874668905326f87d6_JaffaCakes118
Files
-
767436440984d0f874668905326f87d6_JaffaCakes118.exe windows:4 windows x86 arch:x86
f4ab9c5b1d6cd073591af33a8e3ab409
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetPrivateProfileStringA
EnumResourceNamesA
FindNextChangeNotification
IsBadStringPtrA
ReadConsoleOutputA
UnhandledExceptionFilter
GetPrivateProfileStringW
SetSystemTime
FindFirstFileW
GetTimeZoneInformation
FindResourceExW
EnumDateFormatsW
GetSystemTimeAsFileTime
LocalLock
QueryDosDeviceA
WritePrivateProfileSectionW
DeleteFiber
RaiseException
PeekNamedPipe
LoadLibraryExW
GetSystemInfo
GetShortPathNameA
PurgeComm
CloseHandle
LocalReAlloc
ReleaseMutex
UnmapViewOfFile
EnumSystemCodePagesA
CreateProcessA
GlobalDeleteAtom
FindResourceExA
LeaveCriticalSection
ConnectNamedPipe
GetDateFormatA
SetFileTime
DosDateTimeToFileTime
SetCurrentDirectoryA
lstrcpyA
GetLongPathNameA
FindFirstFileA
CreateNamedPipeW
InitializeCriticalSection
SetConsoleActiveScreenBuffer
FatalAppExitA
_lread
GetWindowsDirectoryA
GetTickCount
ExpandEnvironmentStringsW
SetThreadPriorityBoost
GetDriveTypeA
GetSystemDefaultLangID
GetBinaryTypeA
WriteProcessMemory
GetOEMCP
GetThreadContext
EndUpdateResourceA
GetDiskFreeSpaceExA
MoveFileW
GetSystemTime
ReadFile
CreateMutexW
SuspendThread
EnumResourceLanguagesW
GetUserDefaultLCID
GetCommandLineW
EnumResourceNamesW
GetCurrentProcessId
SearchPathW
OutputDebugStringW
GlobalGetAtomNameW
EraseTape
GetVolumeInformationW
GlobalFree
GetProcessTimes
VirtualQueryEx
VirtualLock
TlsGetValue
GetProfileIntA
IsProcessorFeaturePresent
ExitProcess
user32
GetMenuInfo
ChangeMenuW
TranslateAcceleratorW
DestroyCursor
CheckRadioButton
IsWindowVisible
EnumClipboardFormats
CheckDlgButton
SetCursor
GetKeyboardLayoutList
SetCapture
GetMenuItemID
SwapMouseButton
CreateMDIWindowW
MapWindowPoints
LoadCursorW
SetScrollInfo
InSendMessage
CallWindowProcW
DefWindowProcA
LoadIconW
CreateDesktopW
HideCaret
GetWindowWord
OemToCharBuffW
EnumThreadWindows
GetProcessDefaultLayout
GetScrollInfo
GetWindowTextA
FrameRect
MessageBeep
GetKeyboardLayout
CallNextHookEx
InsertMenuItemA
BeginPaint
IsCharAlphaA
GetMonitorInfoW
GetDoubleClickTime
MenuItemFromPoint
LoadBitmapW
IsCharAlphaNumericA
FindWindowA
GetUserObjectInformationW
AttachThreadInput
GetSystemMenu
OpenInputDesktop
CharUpperW
GetCaretBlinkTime
LoadMenuA
DrawFrameControl
IsDlgButtonChecked
LoadAcceleratorsW
EnableMenuItem
UnhookWindowsHook
RegisterDeviceNotificationA
EnableScrollBar
ExcludeUpdateRgn
SendInput
MessageBoxW
CharPrevW
MapVirtualKeyA
SetMenuItemInfoW
gdi32
GetCharacterPlacementW
comdlg32
GetFileTitleW
PrintDlgW
advapi32
StartServiceW
ImpersonateSelf
RegSaveKeyA
ChangeServiceConfigA
NotifyChangeEventLog
BuildSecurityDescriptorW
CryptSetHashParam
RegDeleteValueW
LookupPrivilegeDisplayNameA
GetSidSubAuthorityCount
GetUserNameW
RegCloseKey
RegSaveKeyW
RegRestoreKeyA
SetNamedSecurityInfoW
GetSidLengthRequired
QueryServiceObjectSecurity
StartServiceCtrlDispatcherA
CryptVerifySignatureW
SetEntriesInAclW
CryptGetUserKey
GetSecurityDescriptorGroup
CryptVerifySignatureA
CreateProcessAsUserA
RegGetKeySecurity
ole32
ProgIDFromCLSID
oleaut32
SysStringLen
VariantCopy
LoadTypeLi
SafeArrayRedim
VariantChangeType
SafeArrayPutElement
shlwapi
StrCmpNW
PathRemoveBlanksW
SHAutoComplete
StrRChrA
PathIsDirectoryEmptyW
Sections
.text Size: 13KB - Virtual size: 229KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ