Static task
static1
Behavioral task
behavioral1
Sample
a1df5c299aba1c2bfabe398d16d756d3_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
a1df5c299aba1c2bfabe398d16d756d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a1df5c299aba1c2bfabe398d16d756d3_JaffaCakes118
-
Size
394KB
-
MD5
a1df5c299aba1c2bfabe398d16d756d3
-
SHA1
f964ff140a2a45127524dee59a45bfb5cd05a11a
-
SHA256
686baa0cac40e3d7836ffe3dc4b0449b3dd2a3c33e7854a67f97f1707622c417
-
SHA512
772befb3e2f7829abace13769114feabfadd01012a3ac2412838185b55e581c7da35c3109075fbca214ce75837f5b499ade0eef2aeee1e96c9895b0206d7fd47
-
SSDEEP
6144:ODg+mSzBo4585CsY7OQHbJT68LMhM663cXV:IM6QV4OUokMhM66
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1df5c299aba1c2bfabe398d16d756d3_JaffaCakes118
Files
-
a1df5c299aba1c2bfabe398d16d756d3_JaffaCakes118.exe windows:5 windows x86 arch:x86
99c6cea2c9cc0cd74c26d07e5cd53b8f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileA
FindNextFileA
FindClose
RemoveDirectoryA
CreateDirectoryA
GetCurrentDirectoryA
SetCurrentDirectoryA
GetCurrentProcess
SetFileAttributesA
GetTickCount
GetComputerNameW
CompareStringW
CreateFileW
WriteConsoleW
SetStdHandle
DeleteCriticalSection
GetComputerNameA
LoadLibraryW
HeapReAlloc
RtlUnwind
GetConsoleMode
GetConsoleCP
QueryPerformanceCounter
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameW
GetStdHandle
ExitProcess
HeapSize
GetStringTypeW
IsProcessorFeaturePresent
LCMapStringW
SetLastError
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsValidCodePage
GetOEMCP
GetCPInfo
RaiseException
GetStartupInfoW
SetEnvironmentVariableA
HeapSetInformation
GetCommandLineA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetDateFormatA
GetTimeFormatA
GetSystemTimeAsFileTime
DecodePointer
EncodePointer
InitializeCriticalSection
HeapCreate
HeapFree
HeapAlloc
DeviceIoControl
GetVersionExA
GetACP
GetDriveTypeA
FlushFileBuffers
SetEndOfFile
Sleep
CreateFileA
TerminateProcess
GetVersion
GetTimeZoneInformation
GetCurrentProcessId
MoveFileA
DeleteFileA
SetFileTime
GetFileTime
GetSystemDirectoryA
WriteFile
ReadFile
SetFilePointer
GetFileSize
CloseHandle
WaitForSingleObject
CreateSemaphoreA
FreeLibrary
GetLastError
GetProcAddress
LeaveCriticalSection
LoadLibraryA
EnterCriticalSection
HeapDestroy
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
OutputDebugStringA
GetCurrentThreadId
GetModuleHandleA
GetModuleFileNameA
user32
LoadStringA
LoadIconA
LoadCursorA
wsprintfA
GetKeyboardLayout
MapVirtualKeyExA
MapVirtualKeyA
EnumDisplaySettingsA
wsprintfW
GetKeyNameTextA
GetForegroundWindow
DefWindowProcA
PostQuitMessage
DestroyWindow
DispatchMessageA
TranslateMessage
PeekMessageA
MsgWaitForMultipleObjects
CreateWindowExA
RegisterClassA
gdi32
GetStockObject
advapi32
RegDeleteKeyA
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
GetUserNameA
shell32
SHGetMalloc
SHGetSpecialFolderLocation
SHGetPathFromIDListA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantClear
VariantInit
SysFreeString
SysAllocString
SysAllocStringLen
Sections
.text Size: 227KB - Virtual size: 226KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 852B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ