Static task
static1
Behavioral task
behavioral1
Sample
84898e6750da97fb677620f54f842908_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
84898e6750da97fb677620f54f842908_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
84898e6750da97fb677620f54f842908_JaffaCakes118
-
Size
96KB
-
MD5
84898e6750da97fb677620f54f842908
-
SHA1
4486618db5cc04fa5c56f92b9ea4b05f9279d18f
-
SHA256
e25156fb719afae5b06c18be49eaa36ef1e2e25bbc0a1e37cbb9a334936bbfe4
-
SHA512
08e4f384606aed327237866c9a4332448071a0d5b8294deaa0474363377731946a9a5442be104ec0e632eb00939efe5b3cc765b9f79d86b6701fde8f127f6751
-
SSDEEP
1536:CgyMIkktrGxg3QCq+ySYcLG3aNYgiCyp9tkwRjj:dZIkkVh11ylcdUCyntDj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 84898e6750da97fb677620f54f842908_JaffaCakes118
Files
-
84898e6750da97fb677620f54f842908_JaffaCakes118.exe windows:4 windows x86 arch:x86
ca3cea1858131de1be21ad0065c0d492
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
GlobalFree
GlobalUnlock
GlobalHandle
LeaveCriticalSection
GlobalLock
GlobalReAlloc
GlobalAlloc
EnterCriticalSection
TlsSetValue
LocalReAlloc
TlsGetValue
InterlockedDecrement
GetModuleHandleA
GlobalDeleteAtom
TlsAlloc
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
lstrcmpA
GlobalFlags
GetCPInfo
GetOEMCP
WriteFile
RtlUnwind
HeapReAlloc
HeapAlloc
RaiseException
GetStartupInfoA
HeapFree
HeapSize
TerminateProcess
GetACP
VirtualFree
VirtualAlloc
IsBadWritePtr
GetVersionExA
HeapDestroy
HeapCreate
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
InitializeCriticalSection
LocalFree
LocalAlloc
lstrcpynA
GetCurrentThreadId
WinExec
GetCommandLineA
CreateMutexA
ReleaseMutex
Sleep
SetUnhandledExceptionFilter
CreateFileA
SystemTimeToFileTime
LocalFileTimeToFileTime
WideCharToMultiByte
SetFilePointer
ReadFile
SetLastError
lstrcmpiA
GetTempPathA
GetTickCount
LoadResource
SetFileTime
SizeofResource
lstrlenA
MoveFileA
MultiByteToWideChar
GetVersion
CreateRemoteThread
WaitForSingleObject
OpenProcess
CreateToolhelp32Snapshot
Process32First
Process32Next
CloseHandle
ExitProcess
GetModuleFileNameA
GetShortPathNameA
GetEnvironmentVariableA
lstrcpyA
SetPriorityClass
GetCurrentThread
SetThreadPriority
CreateProcessA
ResumeThread
GetWindowsDirectoryA
MoveFileExA
CopyFileA
DeleteFileA
GetCurrentProcess
lstrcatA
GetLastError
FreeLibrary
LoadLibraryA
GlobalFindAtomA
GetProcAddress
user32
GetCapture
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
PostMessageA
LoadIconA
SetWindowTextA
LoadCursorA
GetSysColorBrush
ReleaseDC
GetDC
GetClassNameA
PtInRect
ClientToScreen
PostQuitMessage
DestroyMenu
TabbedTextOutA
DrawTextA
GrayStringA
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
DispatchMessageA
GetKeyState
CallNextHookEx
PeekMessageA
SetWindowsHookExA
LoadStringA
UnhookWindowsHookEx
GetParent
GetLastActivePopup
GetWindowLongA
SendMessageA
MessageBoxA
EnableWindow
GetInputState
wsprintfA
GetMessageA
PostThreadMessageA
IsWindowEnabled
advapi32
RegQueryValueExA
GetUserNameA
CreateServiceA
LockServiceDatabase
ChangeServiceConfigA
UnlockServiceDatabase
ControlService
StartServiceA
CloseServiceHandle
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenSCManagerA
OpenServiceA
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegCloseKey
LookupAccountNameA
GetFileSecurityA
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
GetAclInformation
GetLengthSid
EqualSid
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetFileSecurityA
comctl32
ord17
netapi32
NetUserGetLocalGroups
NetApiBufferFree
gdi32
GetClipBox
Escape
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SetMapMode
GetStockObject
SelectObject
RestoreDC
CreateBitmap
SetTextColor
SetBkColor
GetObjectA
GetDeviceCaps
DeleteObject
DeleteDC
PtVisible
RectVisible
TextOutA
ExtTextOutA
SaveDC
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
Sections
����0� Size: 90KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
������ Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ