Static task
static1
Behavioral task
behavioral1
Sample
9699b7d05c29ccf138da67ebba144749_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9699b7d05c29ccf138da67ebba144749_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
9699b7d05c29ccf138da67ebba144749_JaffaCakes118
-
Size
512KB
-
MD5
9699b7d05c29ccf138da67ebba144749
-
SHA1
889256929e2a7f9f6987c33b9986b6b6c3c0e4a2
-
SHA256
561993cf756ee238318a09003a476f27d03467ce4e5b481c8804648e186ea451
-
SHA512
8c92592f957e8c6fdd8be4a395362c4060bb9dffd01a12cfaad12a864bbe0e580f1ea557024ffac2507d81bcaff1909a8057f9cd2bd04b4c30b8ba1049dc8fe1
-
SSDEEP
12288:1+q6oGYi+TqJMpCtoYahf24A6CT/BL3tvG:1+/oGYd+JZfsO4ABttvG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9699b7d05c29ccf138da67ebba144749_JaffaCakes118
Files
-
9699b7d05c29ccf138da67ebba144749_JaffaCakes118.exe windows:4 windows x86 arch:x86
ed07fea1d83621d23062feb6d2414cc8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetQueryDataAvailable
DeleteIE3Cache
InternetReadFileExW
InternetSetOptionA
DeleteUrlCacheEntry
CommitUrlCacheEntryW
comctl32
InitCommonControlsEx
shell32
SHGetPathFromIDList
DragQueryFile
DragFinish
SHQueryRecycleBinA
FreeIconList
advapi32
RegSetValueA
LookupAccountNameW
RegQueryInfoKeyW
RegLoadKeyW
LookupAccountSidA
LogonUserA
RegEnumKeyA
user32
EnumPropsExA
GetCaretBlinkTime
CreateWindowExW
IsCharLowerW
MessageBoxA
DragDetect
DrawFocusRect
RegisterWindowMessageA
SetSystemCursor
ShowWindowAsync
GetWindowRgn
ShowWindow
RegisterClassExA
OemToCharA
RegisterClassA
ChildWindowFromPoint
DlgDirListA
GetSysColorBrush
kernel32
SetHandleCount
GetProcAddress
IsDebuggerPresent
OpenMutexA
GetEnvironmentStringsW
RtlUnwind
MoveFileW
GetVersionExA
HeapAlloc
InterlockedDecrement
GetTickCount
CreateFileA
TlsSetValue
WideCharToMultiByte
VirtualFree
GetUserDefaultLCID
GetCPInfo
ExitProcess
HeapFree
GetCurrentThreadId
InterlockedExchange
InitializeCriticalSection
LoadLibraryA
InterlockedIncrement
GetACP
WriteConsoleW
GetConsoleOutputCP
GetConsoleCP
FreeLibrary
GetCurrentThread
HeapSize
LCMapStringW
SetLastError
GetEnvironmentStrings
GetStringTypeA
GetModuleFileNameA
GetProfileStringA
GetFullPathNameA
CloseHandle
IsValidLocale
SetFilePointer
WriteConsoleA
HeapCreate
SetUnhandledExceptionFilter
GetCalendarInfoW
FreeEnvironmentStringsW
SetWaitableTimer
QueryPerformanceCounter
FindNextFileA
TlsGetValue
lstrcpyn
FindFirstFileExW
GetTimeZoneInformation
GetProcessHeap
EnumSystemLocalesA
GetStdHandle
SetEnvironmentVariableA
LeaveCriticalSection
LCMapStringA
HeapReAlloc
GetDateFormatA
GetCurrentProcessId
GetModuleHandleA
CreateMutexA
SetSystemTime
GetSystemTimeAsFileTime
SetStdHandle
FreeEnvironmentStringsA
MultiByteToWideChar
TerminateProcess
ReadFile
DeleteCriticalSection
VirtualQuery
CompareStringW
EnterCriticalSection
GetCommandLineA
ReadConsoleInputW
HeapDestroy
FlushFileBuffers
GetConsoleMode
GetTimeFormatA
IsValidCodePage
GetThreadTimes
GetCurrentProcess
GetLastError
SetConsoleTextAttribute
WriteFile
GetFileType
GetStartupInfoA
GetLocaleInfoW
TlsFree
TlsAlloc
Sleep
UnhandledExceptionFilter
SetConsoleCtrlHandler
CompareStringA
GetStringTypeW
VirtualAlloc
SetFileAttributesA
GetLocaleInfoA
GetOEMCP
gdi32
DeleteDC
GetSystemPaletteEntries
GetKerningPairsA
PlayMetaFile
GdiPlayDCScript
FrameRgn
SetGraphicsMode
CopyMetaFileA
GetDIBits
CreateDCW
GetDeviceCaps
Sections
.text Size: 317KB - Virtual size: 316KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 115KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ