Static task
static1
Behavioral task
behavioral1
Sample
78e3b869ebf554de5bcb04d4e31938e0_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
78e3b869ebf554de5bcb04d4e31938e0_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
78e3b869ebf554de5bcb04d4e31938e0_JaffaCakes118
-
Size
255KB
-
MD5
78e3b869ebf554de5bcb04d4e31938e0
-
SHA1
1f5ab3b5071c1091f6ff0753d64a335d0727565c
-
SHA256
4f572daa80352fa5f5109757f5b3f10e73851a3b54af12d5ae575815d8adb15c
-
SHA512
05cff5c9ec15227a44afe038a42c7df677debaf517bf04ac07357fbd91650363bd17440f66335f9638bbfe72c46aac28f079233473720a06dea8e8dae4df935d
-
SSDEEP
6144:iVUbYyT9H+OjFQZpnZl1uNOHpns7pvNuZ:i+b94OBQDSOJnsFvNu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78e3b869ebf554de5bcb04d4e31938e0_JaffaCakes118
Files
-
78e3b869ebf554de5bcb04d4e31938e0_JaffaCakes118.exe windows:4 windows x86 arch:x86
53c680f9cc37beba7fc8f4794b86d93f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord823
ord825
msvcrt
free
_beginthread
atl
ord21
ord18
ord22
ord15
ord16
ord44
ord43
ord32
ord58
ord23
kernel32
GetVersionExW
SetEvent
WaitForSingleObject
IsBadReadPtr
GetNumberFormatW
GetLocaleInfoW
GetCurrentProcess
InitializeCriticalSection
lstrlenW
GetModuleFileNameW
lstrcpyW
GetShortPathNameW
GetModuleHandleW
lstrcmpiW
GetWindowsDirectoryW
GlobalAlloc
GetModuleHandleA
GetLastError
LoadLibraryW
LoadLibraryA
ExpandEnvironmentStringsW
lstrcmpW
GetCurrentThread
lstrcatW
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
SetUnhandledExceptionFilter
MultiByteToWideChar
lstrlenA
LocalFree
GetProcessHeap
CreateEventW
lstrcmpA
GetProcAddress
user32
SetWindowTextW
SetFocus
SendMessageW
SetDlgItemTextW
DialogBoxParamW
SendDlgItemMessageW
wsprintfW
MessageBeep
ShowWindow
GetDlgItemInt
EndDialog
SetDlgItemInt
LoadImageW
SetCursor
LoadCursorW
ShowCursor
IsWindow
PeekMessageW
SetWindowLongW
PostMessageW
EnableWindow
GetDlgItemTextW
LoadBitmapW
IsDlgButtonChecked
LoadIconW
MessageBoxW
WinHelpW
GetSystemMetrics
advapi32
LookupPrivilegeValueW
OpenThreadToken
AdjustTokenPrivileges
ImpersonateSelf
RegOpenKeyW
RegQueryValueExW
GetUserNameW
LookupAccountNameW
RegEnumKeyExW
RegSetValueExW
RegOpenKeyExW
GetTokenInformation
RegDeleteKeyW
RegCloseKey
RegCreateKeyExW
oleaut32
SafeArrayGetLBound
SafeArrayGetElement
SysAllocStringByteLen
VariantChangeType
SafeArrayGetUBound
SysStringByteLen
VariantClear
VariantInit
SysStringLen
SysAllocString
SysFreeString
ole32
CoCreateInstance
CoInitialize
StringFromCLSID
gdi32
GetTextExtentPointW
DeleteObject
shell32
ShellExecuteW
shlwapi
StrFormatByteSizeW
samlib
SamCloseHandle
SamFreeMemory
SamQueryDisplayInformation
SamRemoveMemberFromAlias
SamQueryInformationGroup
SamRemoveMemberFromGroup
SamConnect
SamEnumerateGroupsInDomain
SamLookupNamesInDomain
Sections
.text Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.xlGmKg Size: 106KB - Virtual size: 118KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Zn Size: 3KB - Virtual size: 218KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 3KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.r Size: 4KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qUAmPP Size: 109KB - Virtual size: 189KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.LaBLsx Size: 2KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ