Static task
static1
Behavioral task
behavioral1
Sample
975d71e5e4be2be50eb748d8a232375e_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
975d71e5e4be2be50eb748d8a232375e_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
975d71e5e4be2be50eb748d8a232375e_JaffaCakes118
-
Size
448KB
-
MD5
975d71e5e4be2be50eb748d8a232375e
-
SHA1
0b7e72fb465acd233f28598c9ebd128a5b8b5750
-
SHA256
d95ca5979b95bc80859ceb82da98e60b6b17b61a1a7bcf34eef7468506cc808f
-
SHA512
75023815df0c10f5897005be97d0922df6a0d8ee1d8f8f15e1bdb41063f062cb04002ecd48d8cbcb369c7808589412540f5696c942cb343e2af421904207ac6f
-
SSDEEP
6144:BGx++dpsOKrPeKtdIV2qjmwnn+3K1Px0U/6Za3ziTTqi2Q2ddfgEPyoAyL/Jcs3u:kjkqV2qaa1pBf3hi0gOfVLR7lISxh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 975d71e5e4be2be50eb748d8a232375e_JaffaCakes118
Files
-
975d71e5e4be2be50eb748d8a232375e_JaffaCakes118.exe windows:5 windows x86 arch:x86
127c4bfd6c36b25292de818180cb389a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfA
CharLowerA
wsprintfA
CharNextA
CloseDesktop
GetThreadDesktop
SetThreadDesktop
OpenDesktopA
SetWindowPos
MapWindowPoints
GetClientRect
GetWindowRect
GetDesktopWindow
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
kernel32
GetCurrentDirectoryA
GetCurrentDirectoryA
GetTempPathA
GetTempPathA
GetTempFileNameA
GetTempFileNameA
SetLastError
LoadLibraryExA
FormatMessageA
GetModuleFileNameA
CreateFileA
DeleteFileA
OutputDebugStringA
OutputDebugStringA
CreateMutexA
GetModuleHandleA
GetFileAttributesA
CreateFileMappingA
CreateProcessA
IsDBCSLeadByte
WaitForSingleObject
GetModuleHandleA
IsBadWritePtr
lstrcmpiA
MapViewOfFileEx
IsBadReadPtr
VirtualAlloc
VirtualFree
HeapFree
GetProcessHeap
HeapAlloc
SetEndOfFile
FlushFileBuffers
TlsAlloc
CompareStringA
CompareStringA
GetVersionExA
CopyFileA
MoveFileExA
FindFirstFileA
FindNextFileA
FindClose
GetFileAttributesA
CreateDirectoryA
OpenFileMappingA
GetSystemInfo
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
QueryPerformanceCounter
SetFilePointer
lstrcatA
LocalFree
WideCharToMultiByte
lstrlenA
FindResourceA
LoadResource
GetSystemDefaultUILanguage
GetExitCodeProcess
lstrcmpA
FindResourceExA
LockResource
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetLastError
GetSystemDirectoryA
DisableThreadLibraryCalls
GetModuleFileNameA
ReleaseMutex
SetFileAttributesA
GetLocalTime
DebugBreak
GetThreadContext
IsDebuggerPresent
GetWindowsDirectoryA
lstrcatA
lstrcpyA
VirtualQueryEx
GetComputerNameA
GetLongPathNameA
WriteFile
lstrlenA
lstrcpyA
ReadFile
InterlockedCompareExchange
InterlockedIncrement
GetCurrentProcess
LeaveCriticalSection
EnterCriticalSection
InterlockedDecrement
CloseHandle
GetCurrentThread
lstrcpynA
FreeLibrary
MultiByteToWideChar
GetProcAddress
LoadLibraryA
ExpandEnvironmentStringsA
lstrcmpiA
GetSystemDefaultLCID
GlobalFree
GlobalAlloc
Sleep
GlobalMemoryStatusEx
GetTickCount
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
SearchPathA
CreateFileA
MoveFileA
DeleteFileA
advapi32
SaferSetLevelInformation
SaferIdentifyLevel
SaferGetLevelInformation
SaferCloseLevel
AddAccessAllowedAceEx
AddAce
GetAce
SetSecurityDescriptorControl
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegSetKeySecurity
RegGetKeySecurity
RegNotifyChangeKeyValue
RegFlushKey
RegConnectRegistryW
GetSecurityDescriptorLength
BuildTrusteeWithSidW
GetSecurityDescriptorDacl
GetAclInformation
GetEffectiveRightsFromAclW
SaferCreateLevel
RegDeleteValueW
RegCreateKeyExW
RegCreateKeyExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegEnumValueW
RegQueryInfoKeyW
RegSetValueExW
AllocateAndInitializeSid
AddAccessAllowedAce
FreeSid
ConvertSidToStringSidW
OpenProcessToken
InitializeSecurityDescriptor
InitializeAcl
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
OpenThreadToken
GetTokenInformation
RegQueryValueExW
GetLengthSid
RegEnumKeyExW
RegOpenKeyExW
RegCloseKey
RegDeleteKeyW
ole32
OleSaveToStream
WriteClassStm
OleLoadFromStream
CoGetMalloc
CLSIDFromString
CreateStreamOnHGlobal
CoSetProxyBlanket
StringFromCLSID
CoTaskMemRealloc
CoCreateInstanceEx
CoCreateInstance
StringFromGUID2
CoCreateGuid
CoGetObjectContext
CoImpersonateClient
CoRevertToSelf
CoTaskMemFree
CoTaskMemAlloc
oleaut32
SysFreeString
VariantInit
SafeArrayCreateVector
SysStringByteLen
SysAllocStringByteLen
VariantChangeType
SysAllocStringLen
VariantClear
SysAllocString
LoadRegTypeLi
LoadTypeLibEx
msvcrt
free
??1type_info@@UAE@XZ
_onexit
__dllonexit
?terminate@@YAXXZ
_adjust_fdiv
_initterm
_wstrdate
_wstrtime
_waccess
wcstombs
mbstowcs
_ltow
_wtol
towupper
_wcslwr
wcsstr
wcstol
swprintf
_ultoa
_vsnwprintf
malloc
realloc
memmove
_snprintf
wcscmp
_wcsnicmp
qsort
_i64tow
_snwprintf
_purecall
wcsncpy
wcsrchr
wcscpy
wcscat
_wcsicmp
__CxxFrameHandler
wcslen
_except_handler3
wcschr
rpcrt4
UuidFromStringA
version
VerQueryValueA
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 146KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.KAJS Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.KEJS Size: 139KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.YQGW Size: 139KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.hags Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 12KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ