Static task
static1
Behavioral task
behavioral1
Sample
93c115d69efd4515a80c7fbe39f5f547_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
93c115d69efd4515a80c7fbe39f5f547_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
93c115d69efd4515a80c7fbe39f5f547_JaffaCakes118
-
Size
454KB
-
MD5
93c115d69efd4515a80c7fbe39f5f547
-
SHA1
0f3237e6867e39f398f4ceb512c2318cd4565296
-
SHA256
17fdfb95967b6ce52cf22015e3bb4e84d3de7452106c38d99b97ae2dbd95b862
-
SHA512
2d6d22b0e4de9d6567dea9443045af491fa432506b197a2f7b18ccd6f7391850f9a0de6e95ac8047320c9857ef9b8d8f91bfad5f3d54c37916ca1bcdeaee9892
-
SSDEEP
12288:S30polt0jCU9lOgK07udPNrse8YhSP45Dm9qor5:S30GlyjplxK0wlge8F9qu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 93c115d69efd4515a80c7fbe39f5f547_JaffaCakes118
Files
-
93c115d69efd4515a80c7fbe39f5f547_JaffaCakes118.exe windows:5 windows x86 arch:x86
5e02d447caea8ad06517f6086944648b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord536
ord693
ord2574
ord4396
ord3365
ord3635
ord6003
ord3993
ord3281
ord6898
ord925
ord3991
ord6211
ord3658
ord3621
ord2406
ord3566
ord1634
ord1143
ord2813
ord547
ord6279
ord6371
ord4480
ord2546
ord2504
ord5727
ord3917
ord1089
ord5193
ord2388
ord3341
ord5296
ord4124
ord4074
ord4692
ord5303
ord5285
ord5710
ord3396
ord4616
ord3733
ord815
ord561
ord3948
ord2717
ord1128
ord3694
ord793
ord3714
ord600
ord1240
ord1173
ord1165
ord1571
ord1250
ord1248
ord1563
ord1194
ord342
ord1179
ord1570
ord1568
ord1115
ord269
ord826
ord941
ord2755
ord4197
ord2756
ord6278
ord6219
ord6218
ord2606
ord5679
ord4272
ord4199
ord3312
ord927
ord2809
ord5798
ord2281
ord5949
ord2637
ord2293
ord6451
ord6466
ord860
ord537
ord3871
ord2810
ord6195
ord4219
ord4352
ord4155
ord6024
ord2294
ord489
ord567
ord818
ord3634
ord4418
ord3397
ord5286
ord4395
ord1768
ord6051
ord2573
ord4214
ord2016
ord2405
ord6362
ord1764
ord4253
ord692
ord768
ord4829
ord5283
ord4848
ord4371
ord4942
ord4970
ord4736
ord4899
ord5154
ord5156
ord5155
ord1899
ord4704
ord6330
ord942
ord940
ord538
ord4847
ord3798
ord324
ord861
ord641
ord3592
ord4419
ord4621
ord4075
ord3074
ord3820
ord3826
ord3825
ord2971
ord3076
ord2980
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5273
ord2116
ord2438
ord5257
ord1720
ord5059
ord3744
ord6372
ord2047
ord2640
ord4435
ord4831
ord3793
ord5276
ord4347
ord5157
ord2377
ord5237
ord4401
ord1767
ord4073
ord6048
ord2506
ord4992
ord4370
ord5261
ord3087
ord4195
ord2634
ord5977
ord2350
ord2362
ord823
ord2859
ord2854
ord825
ord535
ord6370
ord858
ord4229
ord540
ord5298
ord800
msvcrt
_setmode
rewind
fgetws
fclose
fwprintf
swscanf
wcsncmp
_except_handler3
wcscpy
wcslen
_wcsicmp
?terminate@@YAXXZ
_onexit
??1type_info@@UAE@XZ
_adjust_fdiv
_initterm
wcsncpy
_wcsnicmp
wcsrchr
_wfopen
_purecall
malloc
free
_ftol
tmpfile
wcscmp
__CxxFrameHandler
__dllonexit
msvcp60
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
atl
ord15
ord22
ord18
ord21
ord16
ord32
aclui
ord1
advapi32
IsValidSecurityDescriptor
CloseEventLog
RegCloseKey
RegCreateKeyExW
RegOpenKeyExW
RegSetValueExW
RegDeleteKeyW
RegEnumKeyExW
MapGenericMask
GetSecurityDescriptorLength
ReportEventW
RegDeleteValueW
RegOpenKeyW
RegEnumKeyW
OpenEventLogW
gdi32
GetTextExtentPoint32W
gpedit
BrowseForGPO
appmgmts
CsGetClassStore
CsGetClassStorePath
CsGetAppCategories
CsUnregisterAppCategory
CsRegisterAppCategory
ReleasePackageInfo
CsCreateClassStore
ReleasePackageDetail
kernel32
LocalFree
LocalAlloc
GetUserDefaultLCID
GetLocaleInfoW
DeleteFileW
GetModuleHandleA
GetLastError
GetModuleHandleW
GetProcAddress
LoadLibraryW
SetLastError
GetModuleFileNameW
OutputDebugStringA
LoadLibraryA
CloseHandle
WriteFile
CreateFileW
FormatMessageW
GetPrivateProfileStringW
GetCurrentThreadId
lstrlenW
GetCurrentProcess
GlobalAlloc
GlobalFree
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
lstrcmpiW
ExpandEnvironmentStringsW
lstrcpyW
CreateDirectoryW
LockResource
LoadResource
FindResourceW
SystemTimeToFileTime
GetSystemTime
MoveFileW
CopyFileW
GetTempFileNameW
GetTempPathW
CompareStringW
FindClose
FindFirstFileW
IsBadReadPtr
GetWindowsDirectoryW
lstrcpynW
lstrcatW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSection
mpr
WNetGetUniversalNameW
msi
ord8
ord118
ord160
ord159
ord32
ord92
ord158
ord150
ord78
ord141
ord228
ord116
ord165
ord19
ole32
CoCreateInstance
CoCreateGuid
StringFromGUID2
CreateStreamOnHGlobal
CLSIDFromString
CoTaskMemFree
StringFromCLSID
CoTaskMemAlloc
CoUninitialize
CoInitialize
oleaut32
VariantInit
VariantClear
SysAllocStringLen
SysFreeString
SysAllocString
SysStringLen
shell32
SHGetSpecialFolderLocation
ShellExecuteExW
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetMalloc
DragQueryFileW
user32
SetWindowsHookExW
LoadStringW
EnableWindow
SendMessageW
GetFocus
ReleaseDC
GetDC
GetParent
CallNextHookEx
UnhookWindowsHookEx
GetActiveWindow
WinHelpW
MessageBoxW
LoadBitmapW
GetClientRect
LoadCursorW
SetCursor
RegisterClipboardFormatW
wsprintfW
framedyn
?GetFILETIME@WBEMTime@@QBEHPAU_FILETIME@@@Z
??4WBEMTime@@QAEABV0@QAG@Z
Sections
.text Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 13B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ndata Size: 2KB - Virtual size: 460B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ik Size: 2KB - Virtual size: 112B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ocode Size: 2KB - Virtual size: 158B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kpack0 Size: 194KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gddg8 Size: 2KB - Virtual size: 356B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.iaoq Size: 2KB - Virtual size: 60B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.oxcodex Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.0x0x1 Size: 2KB - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x2 Size: 2KB - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x Size: 196KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x3 Size: 2KB - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x4 Size: 2KB - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0x0x5 Size: 2KB - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CRT Size: 2KB - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ