Static task
static1
Behavioral task
behavioral1
Sample
8d675bc3adc863572526a35b2f7712ce_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8d675bc3adc863572526a35b2f7712ce_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8d675bc3adc863572526a35b2f7712ce_JaffaCakes118
-
Size
290KB
-
MD5
8d675bc3adc863572526a35b2f7712ce
-
SHA1
368c3c1f34af9ee33c6d873c066521eb2f441d32
-
SHA256
a0493dd78987bed430a6232c4c06211e0c4149289c1e13ed2855c5b259851e52
-
SHA512
60af7af41d9bd2d8a125945d4093d8beb3c6df9cb62824bf7c3eacd3ab81a065ec46bffd2ca2b3565851e1b11cd595c274685c873fc02e8056ba3e2e04e04991
-
SSDEEP
6144:/TxLRt13ubQVwRdn5ZV+CyQaNWYOjTgG7z7UggFqy:/dL0bQVwLn5Z8QUWFv7bu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8d675bc3adc863572526a35b2f7712ce_JaffaCakes118
Files
-
8d675bc3adc863572526a35b2f7712ce_JaffaCakes118.exe windows:4 windows x86 arch:x86
4225717f28b9ae2c1d761738ca1cbe95
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalDeleteAtom
LocalFlags
WaitForMultipleObjectsEx
GetVersionExA
SetThreadPriorityBoost
OpenMutexW
GetCompressedFileSizeW
SetLocaleInfoA
WriteConsoleW
DeleteAtom
FindCloseChangeNotification
IsBadReadPtr
HeapSize
GetFileType
GetWriteWatch
ReleaseMutex
WriteConsoleInputA
FreeConsole
SetConsoleCursorPosition
WriteTapemark
lstrcmpiW
GetProcessTimes
WaitForSingleObject
FreeEnvironmentStringsW
InitAtomTable
GetSystemPowerStatus
WaitNamedPipeW
FreeLibraryAndExitThread
GetFileAttributesW
GetCurrentThread
HeapCreate
FindClose
GetModuleHandleA
MoveFileA
GlobalReAlloc
TlsAlloc
CloseHandle
FlushInstructionCache
UnlockFileEx
EnumResourceTypesA
GetEnvironmentStrings
CreateNamedPipeW
ExpandEnvironmentStringsW
GetThreadSelectorEntry
GetStartupInfoA
GetConsoleTitleA
GetTempFileNameA
SetEnvironmentVariableA
lstrcpyA
WideCharToMultiByte
ScrollConsoleScreenBufferW
DisconnectNamedPipe
GlobalAddAtomW
GetEnvironmentVariableA
GetUserDefaultLCID
OpenProcess
WaitForSingleObjectEx
GetSystemDirectoryW
BeginUpdateResourceA
SwitchToFiber
CreateDirectoryW
GlobalFix
AreFileApisANSI
GetProcessHeap
SetFilePointer
user32
ModifyMenuW
CreateIconFromResource
GetSysColor
IsCharLowerA
LoadIconW
OpenInputDesktop
VkKeyScanA
IsDialogMessageA
CharLowerBuffW
ModifyMenuA
mouse_event
DefFrameProcA
AppendMenuA
DestroyMenu
GetInputState
DispatchMessageW
GetUserObjectInformationW
CreateDialogParamW
SetClassLongA
GetClipboardViewer
SetRectEmpty
TranslateAcceleratorA
GetCapture
GetCaretPos
DlgDirListComboBoxA
LoadKeyboardLayoutW
GetWindowPlacement
DestroyWindow
RegisterClassA
UnloadKeyboardLayout
ReplyMessage
IsWindow
SetWindowsHookExA
CharUpperA
EnumDisplaySettingsW
CreateDialogParamA
FindWindowExA
PeekMessageW
LoadCursorW
SetThreadDesktop
LoadStringW
GetKeyboardLayout
GetSysColorBrush
IsCharAlphaA
gdi32
GetDCOrgEx
SetSystemPaletteUse
SetBrushOrgEx
PlayEnhMetaFileRecord
PolyBezierTo
StartDocW
GetTextExtentPointW
SetStretchBltMode
CreateRectRgnIndirect
Rectangle
SetWorldTransform
AngleArc
GetMetaRgn
ExtFloodFill
SetColorSpace
SetDIBitsToDevice
SetArcDirection
GetTextMetricsW
CreateScalableFontResourceW
CreatePatternBrush
FloodFill
GetWorldTransform
GetTextExtentPointA
AddFontResourceA
TranslateCharsetInfo
Chord
CreateICW
EnumFontFamiliesExW
PolylineTo
Pie
GetKerningPairsW
GetICMProfileA
GetDeviceGammaRamp
TextOutA
GetPaletteEntries
SetMiterLimit
GetDIBColorTable
GetCharABCWidthsW
CreateRoundRectRgn
SetMapperFlags
comdlg32
ChooseColorA
FindTextA
advapi32
IsValidSecurityDescriptor
ChangeServiceConfigW
InitiateSystemShutdownA
PrivilegedServiceAuditAlarmW
CryptAcquireContextA
ClearEventLogW
LookupPrivilegeDisplayNameA
BuildImpersonateTrusteeA
ControlService
RegEnumKeyW
GetMultipleTrusteeOperationA
FindFirstFreeAce
CryptDeriveKey
SetAclInformation
AdjustTokenPrivileges
CryptVerifySignatureW
RegRestoreKeyA
CreateProcessAsUserW
LookupPrivilegeDisplayNameW
GetNamedSecurityInfoW
RegEnumValueW
RevertToSelf
DeregisterEventSource
SetEntriesInAclW
DeleteAce
AddAuditAccessAce
BuildTrusteeWithNameA
ObjectPrivilegeAuditAlarmA
ObjectOpenAuditAlarmA
GetExplicitEntriesFromAclW
shell32
SHFileOperationA
DuplicateIcon
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetDesktopFolder
Shell_NotifyIconA
DoEnvironmentSubstW
SHGetMalloc
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_except_handler3
Sections
.text Size: 273KB - Virtual size: 276KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tbzw6j2x Size: 62B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
r4i4e0vg Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ