Static task
static1
Behavioral task
behavioral1
Sample
84a35b34c2dea777236b8e665a17f904_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
84a35b34c2dea777236b8e665a17f904_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
84a35b34c2dea777236b8e665a17f904_JaffaCakes118
-
Size
184KB
-
MD5
84a35b34c2dea777236b8e665a17f904
-
SHA1
ec69a75ac94b96adedf7a786a3f56f1391beb16e
-
SHA256
cd638225395d7cdea5bff23998647edb765394484c8356e44dafa427cc6b87b1
-
SHA512
4d42407fb9b887ffa6e3d3b69885bb724d9b961bd72fdd7b18795b0858a7722218dac5a3d48184da6c6fb3d48a8de53b55d9d933e197180d631d205e345ba840
-
SSDEEP
3072:GZcVljSi1p9qzY3/kHlra9X6ouS1ftsXbwIGeJlXmKxP0jr6Y/D:icaiz9xcH9aHuS1EscyKc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84a35b34c2dea777236b8e665a17f904_JaffaCakes118
Files
-
84a35b34c2dea777236b8e665a17f904_JaffaCakes118.exe windows:4 windows x86 arch:x86
5a3df419e81601c1c1611f4ef843c2d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
cfgmgr32
CM_Locate_DevNodeA
CM_Reenumerate_DevNode
shlwapi
PathFindExtensionA
PathFindFileNameA
PathIsDirectoryA
PathFileExistsA
PathAddBackslashA
PathAppendA
kernel32
WritePrivateProfileStringA
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetErrorMode
RtlUnwind
HeapFree
ExitProcess
TerminateProcess
HeapAlloc
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetStartupInfoA
GetCommandLineA
HeapReAlloc
HeapSize
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
LCMapStringW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetUnhandledExceptionFilter
GetStringTypeA
IsBadReadPtr
IsBadCodePtr
SetStdHandle
InterlockedExchange
GetACP
GetLocaleInfoA
GetThreadLocale
GetVersionExA
SizeofResource
LockResource
LoadResource
FindResourceA
WideCharToMultiByte
lstrlenA
lstrcpyA
lstrcmpiA
RaiseException
InitializeCriticalSection
DeleteCriticalSection
OutputDebugStringA
GetLastError
CreateMutexA
FreeLibrary
CloseHandle
lstrcatA
GetCurrentProcess
GetProcAddress
LoadLibraryA
FindClose
lstrcmpA
FindNextFileA
FindFirstFileA
GetModuleHandleA
WaitForSingleObject
GetStringTypeW
Sleep
GetFileAttributesA
GetOEMCP
GetCPInfo
GetExitCodeProcess
MoveFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
MultiByteToWideChar
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GlobalFlags
GetCurrentThread
GetModuleFileNameA
ConvertDefaultLocale
EnumResourceLanguagesA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GetVersion
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
InterlockedDecrement
SetLastError
MulDiv
GlobalAlloc
FormatMessageA
lstrcpynA
LocalFree
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
user32
LoadCursorA
GetSysColorBrush
DestroyMenu
GetMessageA
GetCursorPos
ValidateRect
SetCursor
PostQuitMessage
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
ShowWindow
SetWindowTextA
IsDialogMessageA
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
MessageBoxA
GetKeyState
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
PostMessageA
AdjustWindowRectEx
GetClassInfoA
EnableWindow
SendMessageA
GetDesktopWindow
DispatchMessageA
TranslateMessage
PeekMessageA
RegisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
CopyRect
PtInRect
GetWindow
GetSysColor
EndPaint
BeginPaint
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
wsprintfA
MsgWaitForMultipleObjects
UnregisterClassA
DrawIcon
AppendMenuA
GetSystemMenu
IsIconic
GetClientRect
FlashWindow
LoadIconA
GetSystemMetrics
EndDialog
GetNextDlgTabItem
GetParent
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetActiveWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsWindowEnabled
gdi32
DeleteObject
GetObjectA
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
CreateBitmap
GetStockObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
GetDeviceCaps
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegEnumKeyExA
RegSetValueExA
RegCreateKeyA
RegQueryValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyA
RegCloseKey
RegOpenKeyExA
shell32
SHGetFolderPathA
ShellExecuteExA
comctl32
ord17
oleaut32
VariantClear
VariantInit
VariantChangeType
Sections
.text Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE