Static task
static1
Behavioral task
behavioral1
Sample
959b5eda0fb6dc9e13cae144a24614ce_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
959b5eda0fb6dc9e13cae144a24614ce_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
959b5eda0fb6dc9e13cae144a24614ce_JaffaCakes118
-
Size
360KB
-
MD5
959b5eda0fb6dc9e13cae144a24614ce
-
SHA1
4361bd2466faadea4d26efd5250a599cf92db2b5
-
SHA256
5ce0357c3f3df2c58ae78972c60f9b15613239f40fbad25430b9be141d581ebd
-
SHA512
0d34eef8358cf926c90e5df686b096c4d68f35fc3b6d6d16313108ff3aec3f4dc5701085f500567794691a68110318820f4c81733ca358dbff586462ae01ba3f
-
SSDEEP
6144:4FJfkXoYo39II6tUV+dJmjkATwX276vahJ68a1qUkp82GJ1pw+aYCP:4jfkXaI7tI4ye276vU7a1Xkp87JwtYCP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 959b5eda0fb6dc9e13cae144a24614ce_JaffaCakes118
Files
-
959b5eda0fb6dc9e13cae144a24614ce_JaffaCakes118.exe windows:9 windows x86 arch:x86
e376f1edaf2a07e9b16d19965ee2bd08
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
mpr
WNetCloseEnum
WNetOpenEnumW
netapi32
NetApiBufferSize
NetShareEnum
NetWkstaGetInfo
NetServerEnum
setupapi
SetupOpenInfFileW
ntmsapi
BeginNtmsDeviceChangeDetection
OpenNtmsSessionW
CloseNtmsNotification
EndNtmsDeviceChangeDetection
EjectNtmsMedia
DeleteNtmsMediaPool
msorcl32
SQLRowCount
ConfigDSN
SQLDescribeParam
SQLGetData
SQLTables
SQLBrowseConnect
SQLExecute
SQLForeignKeys
SQLGetConnectOption
SQLConnect
rpcrt4
UuidFromStringW
syssetup
AsrCreateStateFileW
gdi32
CreateFontIndirectW
mapi32
BMAPIGetReadMail
MAPILogon
FixMAPI
MAPIAdminProfiles
MAPILogoff
DllCanUnloadNow
cmc_query_configuration
HrGetOmiProvidersFlags
FGetComponentPath
RTFSync
GetOutlookVersion
MAPISaveMail
MAPIOpenLocalFormContainer
BMAPIGetAddress
MAPISendMail
MAPIDetails
GetTnefStreamCodepage
BMAPIReadMail
MAPIUninitialize
MAPIReadMail
user32
LoadBitmapW
GetWindow
SetActiveWindow
wvsprintfW
LoadMenuW
GetSysColor
ShowWindow
GetWindowRect
GetDC
GetMenuItemID
GetAsyncKeyState
SendMessageW
IsWindowVisible
IsCharAlphaW
UnhookWindowsHookEx
CreateIconIndirect
SetWindowPos
LockSetForegroundWindow
GetWindowLongW
InvalidateRgn
SendDlgItemMessageW
GetActiveWindow
ntdll
_aulldvrm
comctl32
InitCommonControlsEx
ole32
CoTaskMemFree
CoCreateInstance
StringFromGUID2
CoInitializeSecurity
kernel32
GetVolumeNameForVolumeMountPointW
FormatMessageW
GetLocalTime
GetTickCount
SetTapePosition
LocalFree
LocalFileTimeToFileTime
GlobalFree
GetProcessHeap
Sleep
ExitThread
GetFileSize
MoveFileExW
LoadLibraryW
UnhandledExceptionFilter
VirtualAlloc
GetLogicalDriveStringsW
HeapSize
DeviceIoControl
WideCharToMultiByte
FileTimeToLocalFileTime
CreateMutexW
LeaveCriticalSection
GetSystemTimeAsFileTime
GetNumberFormatW
GetProcAddress
PrepareTape
LocalAlloc
GetCurrentProcessId
GetEnvironmentVariableW
WaitForSingleObject
CreateDirectoryW
CloseHandle
GetExitCodeThread
HeapAlloc
GetWindowsDirectoryW
WriteFile
GetVersionExA
SetEvent
VirtualFree
GetDiskFreeSpaceExW
shell32
SHGetFileInfoW
SHGetMalloc
advapi32
SetFileSecurityW
RegUnLoadKeyW
FreeSid
SetSecurityDescriptorDacl
OpenThreadToken
DeleteAce
LookupPrivilegeValueW
SetEntriesInAclW
GetTokenInformation
GetUserNameW
RegOpenKeyW
Sections
.text Size: 253KB - Virtual size: 253KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 708KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ