Static task
static1
Behavioral task
behavioral1
Sample
78a3371336a4507cdcbbe4faed3c1432_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
78a3371336a4507cdcbbe4faed3c1432_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
78a3371336a4507cdcbbe4faed3c1432_JaffaCakes118
-
Size
285KB
-
MD5
78a3371336a4507cdcbbe4faed3c1432
-
SHA1
941c9149db1f49ace89b1cdfe3f998f346815f53
-
SHA256
e7057abbc69f96d96dae4bf427a6e5647af5557a1b4c76d22dcdf766c6a26e57
-
SHA512
6ca3c79be957375eeb795477d5a017a83366649eb9d64921d0d48bccd5eae9c71e208ec63f021db1be3fba77c3b02b06c96f09e3733c32b35c765638e7abea8c
-
SSDEEP
6144:UTtXvsj28iDOppppppppppppppppppppppppppppppppppppppppppppppppppp0:UTm9iOpppppppppppppppppppppppppR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78a3371336a4507cdcbbe4faed3c1432_JaffaCakes118
Files
-
78a3371336a4507cdcbbe4faed3c1432_JaffaCakes118.exe windows:5 windows x86 arch:x86
128e23d80c8ee965f291ea8e27f8a1a0
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
userenv
GetProfilesDirectoryA
kernel32
GetComputerNameA
InterlockedIncrement
InterlockedDecrement
GetVolumeInformationA
GetCurrentProcessId
OpenProcess
GlobalAlloc
GlobalFree
LocalFree
ExitProcess
CreateMutexA
GetModuleHandleW
IsValidCodePage
GetOEMCP
FlushFileBuffers
GetModuleHandleA
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
QueryPerformanceCounter
VirtualFree
lstrcpyA
DeleteFileA
GetTempPathA
CloseHandle
GetVersionExA
FindNextFileA
GetModuleFileNameA
LoadLibraryA
GetPrivateProfileStringA
FindClose
GetProcAddress
RemoveDirectoryA
GetLastError
FindFirstFileA
lstrcatA
ReadFile
GetFileAttributesA
Sleep
WriteFile
GetProcessHeap
GetTickCount
GetACP
HeapFree
GetCurrentProcess
HeapAlloc
FreeLibrary
SetEndOfFile
MoveFileExA
lstrlenA
SetFilePointer
lstrcmpA
GetFileSize
CreateFileA
TlsGetValue
WriteConsoleW
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetStdHandle
HeapSize
LCMapStringW
GetCPInfo
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
MultiByteToWideChar
WideCharToMultiByte
LCMapStringA
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TerminateProcess
UnhandledExceptionFilter
TlsAlloc
user32
ExitWindowsEx
SendMessageA
FindWindowA
MessageBoxA
GetShellWindow
EndPaint
DestroyWindow
GetMessageA
GetWindowRect
RegisterClassExA
PostQuitMessage
FillRect
SetForegroundWindow
LoadBitmapA
LoadIconA
SetFocus
BeginPaint
IsDialogMessageA
TranslateMessage
InvalidateRect
GetWindowLongA
CreateWindowExA
GetDlgItem
DefWindowProcA
GetSysColor
SetWindowPos
ShowWindow
DispatchMessageA
AdjustWindowRectEx
SystemParametersInfoA
SetWindowTextA
UpdateWindow
LoadCursorA
GetUserObjectSecurity
GetWindowThreadProcessId
gdi32
GetTextExtentPoint32A
DeleteDC
CreateFontA
SetBkMode
DeleteObject
SelectObject
CreateCompatibleDC
GetObjectA
GetStockObject
CreateSolidBrush
TextOutA
BitBlt
advapi32
RegEnumKeyA
IsValidSid
GetSecurityDescriptorOwner
LookupAccountSidA
GetTokenInformation
ConvertSidToStringSidA
RegCloseKey
AdjustTokenPrivileges
RegOpenKeyA
GetUserNameA
RegDeleteValueA
RegOpenKeyExA
LookupPrivilegeValueA
RegCreateKeyA
RegDeleteKeyA
RegQueryValueExA
RegSetValueExA
OpenProcessToken
shell32
ShellExecuteA
ord680
SHGetFolderPathA
ShellExecuteExA
SHFileOperationA
oleaut32
VariantClear
shlwapi
wnsprintfA
StrNCatA
PathFileExistsA
SHDeleteKeyA
Sections
.text Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 191KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ