Static task
static1
Behavioral task
behavioral1
Sample
779b89e3c1cdb7192dfeb43da3fe7c42_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
779b89e3c1cdb7192dfeb43da3fe7c42_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
779b89e3c1cdb7192dfeb43da3fe7c42_JaffaCakes118
-
Size
29KB
-
MD5
779b89e3c1cdb7192dfeb43da3fe7c42
-
SHA1
676ee49002dac584b2db15bafcca6e9cd96c9e05
-
SHA256
61b7c653171c3f38bec8f8e0eeaf3791ff3224d87b4e0310535d617cc4231a22
-
SHA512
51f19d5b7f5aa9b61ed44662417c9ef82a2fd2c4b8a8cddbebcfb953e24c58193cd89e16ae0f235fd9e5bcad6f02e346f50f5774b8657e9a1008eb32562c0465
-
SSDEEP
384:fK1ibcsBtLc/uXgDFhF6ohGr1QGiH+cJINEf11e4Cp3Ih:S1ibjFX+7woIrjiVtMa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 779b89e3c1cdb7192dfeb43da3fe7c42_JaffaCakes118
Files
-
779b89e3c1cdb7192dfeb43da3fe7c42_JaffaCakes118.exe windows:5 windows x86 arch:x86
43b198fbfdc82810c703b093fcb7f622
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetWindowsDirectoryA
Beep
BeginUpdateResourceA
BuildCommDCBAndTimeoutsA
CreateEventA
CreateMailslotA
CreateMutexW
CreateProcessW
CreateRemoteThread
DebugActiveProcess
DeleteCriticalSection
DeleteFileA
DnsHostnameToComputerNameW
EnumCalendarInfoExA
EnumCalendarInfoW
EnumLanguageGroupLocalesA
EnumLanguageGroupLocalesW
EnumResourceLanguagesA
EnumResourceNamesA
EnumResourceTypesA
FindFirstFileExW
FindNextVolumeA
FindNextVolumeMountPointW
FlushConsoleInputBuffer
GetBinaryType
GetCompressedFileSizeW
GetComputerNameA
GetConsoleOutputCP
GetCurrencyFormatA
GetCurrentDirectoryA
GetCurrentThread
GetNamedPipeInfo
GetPrivateProfileIntA
GetPrivateProfileSectionNamesW
GetShortPathNameW
GetStdHandle
GetSystemPowerStatus
GetTapeParameters
GetTempFileNameW
GetTempPathA
GetTimeFormatW
GetVersionExW
GetVolumeNameForVolumeMountPointA
GlobalDeleteAtom
GlobalFlags
GlobalMemoryStatusEx
GlobalReAlloc
GetProcAddress
HeapCompact
HeapCreate
HeapValidate
InterlockedIncrement
IsBadStringPtrW
IsBadWritePtr
IsDBCSLeadByte
LoadLibraryExW
LoadModule
LocalFlags
Module32FirstW
MoveFileA
OpenFileMappingA
OpenJobObjectW
OpenWaitableTimerW
OutputDebugStringA
QueryInformationJobObject
ReadConsoleOutputAttribute
ReleaseMutex
SetCalendarInfoA
SetCommBreak
SetConsoleTitleW
SetDefaultCommConfigA
SetLastError
SetNamedPipeHandleState
SetProcessShutdownParameters
SetTapeParameters
SetThreadContext
SetThreadExecutionState
SetThreadPriority
SetVolumeLabelA
SleepEx
SystemTimeToTzSpecificLocalTime
TlsGetValue
VerLanguageNameA
VirtualFree
VirtualQuery
WaitCommEvent
WriteConsoleOutputA
WriteFile
WritePrivateProfileStructW
WriteProcessMemory
WriteProfileSectionW
WriteProfileStringA
_hread
_lwrite
lstrcpyn
Heap32First
VirtualAlloc
msvcrt
memset
memcpy
user32
GetDC
gdi32
DPtoLP
shell32
SHEmptyRecycleBinW
CheckEscapesW
DoEnvironmentSubstW
DragAcceptFiles
DragQueryFile
Shell_NotifyIconW
ShellHookProc
ShellExecuteW
ShellExecuteExW
ShellExecuteEx
SHQueryRecycleBinW
SHPathPrepareForWriteW
SHPathPrepareForWriteA
SHLoadInProc
SHInvokePrinterCommandA
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
SHGetSettings
SHGetPathFromIDListA
SHGetMalloc
SHGetInstanceExplorer
SHGetIconOverlayIndexA
SHGetFolderPathW
SHGetFolderPathA
SHGetFolderLocation
SHGetFileInfoW
SHGetFileInfoA
SHGetDiskFreeSpaceExW
SHGetDiskFreeSpaceA
SHFreeNameMappings
SHFormatDrive
SHFileOperation
DragQueryFileA
SHEmptyRecycleBinA
SHCreateDirectoryExW
SHCreateDirectoryExA
SHChangeNotify
SHAppBarMessage
SHAddToRecentDocs
FindExecutableW
ExtractIconEx
ExtractIconA
ExtractAssociatedIconW
ExtractAssociatedIconExW
ExtractAssociatedIconExA
ExtractAssociatedIconA
DragQueryPoint
DragQueryFileAorW
shlwapi
StrStrA
StrStrIA
StrStrIW
StrRStrIW
StrChrA
StrChrIA
StrCmpNA
StrCmpNW
StrRChrA
StrRChrIA
StrRChrW
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
a Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
b Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
c Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 136B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ