Static task
static1
Behavioral task
behavioral1
Sample
96df101b770c1f28415863ab5713c294_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
96df101b770c1f28415863ab5713c294_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
96df101b770c1f28415863ab5713c294_JaffaCakes118
-
Size
176KB
-
MD5
96df101b770c1f28415863ab5713c294
-
SHA1
00c6eee5a9ea8d737fb2c5b733e3c67d02b361f0
-
SHA256
7795adca869300677ef43f91bb575a531dba63c00d107c610086ee7c16dc1aca
-
SHA512
5ccf599c99cfd1a27b75772987c397de5f015b4b8dc8503649e136dd829106293785a118a5e3eb3f2bbcfd09d1a2371cc8744155ffedf88730452908b64bfd49
-
SSDEEP
3072:2mIoWYuRGpLiYxzg4VbDquQOz11A2W1ig91nHNoJtsNrCPOmA7fTlZ:ntqRGp+23VbDBNJm91OPsNQOfTlZ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 96df101b770c1f28415863ab5713c294_JaffaCakes118
Files
-
96df101b770c1f28415863ab5713c294_JaffaCakes118.exe windows:4 windows x86 arch:x86
d2ddfbb11dc62a5b1d881d73acb43824
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeLibraryAndExitThread
UnhandledExceptionFilter
EnterCriticalSection
GetEnvironmentStringsW
TerminateProcess
GetTickCount
LeaveCriticalSection
ExitProcess
GetModuleFileNameA
HeapAlloc
WaitForSingleObjectEx
CreateFileA
InterlockedExchange
GetModuleHandleW
WaitForSingleObject
ReadFile
MultiByteToWideChar
WriteFile
GetVersionExA
FindClose
GetVersionExW
DeleteCriticalSection
Sleep
WideCharToMultiByte
GetSystemTimeAsFileTime
GetLastError
GetCurrentProcessId
GetCurrentThreadId
GetCurrentProcess
FreeLibrary
LoadLibraryA
InitializeCriticalSectionAndSpinCount
CloseHandle
SetUnhandledExceptionFilter
InterlockedCompareExchange
HeapFree
SetLastError
SetFilePointerEx
InitializeCriticalSection
SetFilePointer
GetStartupInfoA
QueryPerformanceCounter
GetModuleHandleA
VirtualAllocEx
user32
GetMenuItemCount
SetMenuItemInfoA
CreateWindowExA
DestroyWindow
GetKeyState
PtInRect
GetMenuStringW
PostMessageW
DestroyMenu
GetActiveWindow
AllowSetForegroundWindow
DestroyIcon
DefWindowProcW
LoadIconA
GetMenu
CheckMenuItem
CreateWindowExW
SetWindowTextW
SendMessageW
ReleaseDC
GetSubMenu
InflateRect
GetCursorPos
GetClientRect
LoadStringW
SetWindowPos
SetCapture
RegisterClassW
SetActiveWindow
UnregisterClassA
TrackPopupMenu
ClientToScreen
SetWindowLongW
ShowWindowAsync
OffsetRect
ReleaseCapture
AdjustWindowRectEx
DrawFocusRect
MessageBeep
MoveWindow
ole32
OleUninitialize
OleInitialize
CoRegisterMallocSpy
CoRegisterMessageFilter
CoRegisterPSClsid
CoRegisterSurrogate
CoRevokeInitializeSpy
CoReleaseServerProcess
CoResumeClassObjects
CoRevertToSelf
CoTaskMemAlloc
CoTaskMemFree
CoRegisterChannelHook
CoRevokeMallocSpy
CoRegisterClassObject
CoSuspendClassObjects
CoTaskMemRealloc
CoSetProxyBlanket
CoTreatAsClass
CoRevokeClassObject
CoSwitchCallContext
CoReleaseMarshalData
OleRegGetUserType
advapi32
RegCloseKey
CryptCreateHash
CryptDestroyHash
OpenServiceW
QueryServiceStatus
RevertToSelf
RegEnumKeyExA
RegEnumValueA
DeregisterEventSource
CryptAcquireContextW
CloseServiceHandle
AddAccessAllowedAceEx
LookupPrivilegeValueA
CryptGenRandom
RegDeleteKeyA
RegDeleteValueA
AddAccessAllowedAce
EqualSid
GetLengthSid
InitializeAcl
AdjustTokenPrivileges
OpenThreadToken
CryptAcquireContextA
FreeSid
RegQueryInfoKeyW
RegEnumValueW
RegDeleteKeyW
RegCreateKeyExA
CryptReleaseContext
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AllocateAndInitializeSid
RegDeleteValueW
RegEnumKeyExW
RegSetValueExA
GetTokenInformation
RegCreateKeyExW
RegSetValueExW
OpenProcessToken
RegQueryValueExA
RegOpenKeyExA
RegQueryValueExW
RegOpenKeyExW
CryptHashData
msimg32
GradientFill
msvcrt
__dllonexit
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_onexit
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_adjust_fdiv
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 132KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ