Static task
static1
Behavioral task
behavioral1
Sample
a38153c837102146851127385f5ef370_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a38153c837102146851127385f5ef370_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a38153c837102146851127385f5ef370_JaffaCakes118
-
Size
499KB
-
MD5
a38153c837102146851127385f5ef370
-
SHA1
9e3afccb57c584bff275e7907cf28eac9b4c7aad
-
SHA256
e5cd9305d2f32fc6e1155ac6d4054101fe428a834ccc008746ede93ee694d3f3
-
SHA512
873b9420653b9222f61b1c2980b05aca3284617d93742d408e851bf83e4861382a36a487da49ef1e68603ac40c354530b8f0e4909c14b2c42a44890c2736526a
-
SSDEEP
12288:W2h/L5gQF/DakMMnMMMMMRx5aYGFXOpdtrVJ9mg0a2:W2hdgC/DakMMnMMMMMRxFGMRrx0t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a38153c837102146851127385f5ef370_JaffaCakes118
Files
-
a38153c837102146851127385f5ef370_JaffaCakes118.exe windows:4 windows x86 arch:x86
47990172f374aa49dea76e3459113802
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
LookupPrivilegeValueA
RegQueryValueExA
RegSetValueExW
RegQueryInfoKeyA
ReportEventA
RegOpenKeyA
SetSecurityDescriptorDacl
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
RegisterEventSourceA
RegCloseKey
AdjustTokenPrivileges
RegEnumKeyW
RegDeleteKeyW
RegSetValueA
RegEnumKeyA
RegEnumValueW
RegOpenKeyW
RegDeleteValueW
InitializeSecurityDescriptor
RegQueryValueExW
DeregisterEventSource
RegCreateKeyA
RegCreateKeyW
RegQueryValueA
RegSetValueExA
OpenProcessToken
RegEnumValueA
samlib
SamiLmChangePasswordUser
SamTestPrivateFunctionsUser
SamConnectWithCreds
SamRemoveMultipleMembersFromAlias
mswsock
sethostname
ddraw
DirectDrawEnumerateA
kernel32
GetACP
GetSystemDirectoryA
SystemTimeToFileTime
FreeEnvironmentStringsA
HeapAlloc
HeapSize
UnhandledExceptionFilter
GetOEMCP
VirtualFree
LoadResource
GetModuleFileNameA
CreateProcessA
HeapCreate
TlsGetValue
ReadFile
SetLocalTime
_lclose
SetEvent
SetEndOfFile
ReleaseSemaphore
GetStringTypeW
FileTimeToLocalFileTime
VirtualProtect
LockFile
GetStdHandle
_lwrite
SetFilePointer
TerminateProcess
lstrcmpiW
RemoveDirectoryA
GetVersion
EnterCriticalSection
InterlockedDecrement
GetModuleHandleA
TlsFree
GlobalLock
GetSystemDefaultLangID
WriteFile
HeapDestroy
FormatMessageA
MoveFileA
lstrcatA
FormatMessageW
lstrcpyA
GetFullPathNameA
FindClose
LoadLibraryExA
GetTimeZoneInformation
GetExitCodeProcess
CreateDirectoryA
LCMapStringW
GetTempFileNameA
ExitThread
GetWindowsDirectoryA
CloseHandle
FlushFileBuffers
GetLocaleInfoA
SearchPathA
FindFirstFileA
GetDriveTypeA
TlsAlloc
GetLocalTime
GetCPInfo
CompareStringW
GetDateFormatA
HeapFree
GetStartupInfoA
DeleteCriticalSection
GetFileType
GetProcAddress
RaiseException
DeleteFileA
GlobalDeleteAtom
GetVersionExA
GetVolumeInformationA
InitializeCriticalSection
RtlUnwind
VirtualQuery
SetStdHandle
SetLastError
UnlockFile
GetModuleFileNameW
GetProfileStringA
GetShortPathNameA
GetLastError
FreeResource
CompareStringA
FindResourceA
LockResource
SetFileAttributesA
FreeEnvironmentStringsW
GetFileTime
GetTickCount
_lread
ExitProcess
IsBadReadPtr
MulDiv
GlobalAlloc
IsDBCSLeadByte
CreateEventA
WaitForSingleObject
WinExec
GlobalUnlock
GlobalReAlloc
lstrcpynA
LoadLibraryA
LeaveCriticalSection
SizeofResource
DuplicateHandle
GetStringTypeExA
FileTimeToSystemTime
GlobalHandle
LCMapStringA
IsBadCodePtr
SetFileTime
FindNextFileA
GetFileAttributesA
MultiByteToWideChar
GlobalSize
ResumeThread
lstrcmpA
GetCommandLineA
FlushInstructionCache
TlsSetValue
GetTempPathA
lstrlenA
FreeLibrary
GetSystemDefaultLCID
_llseek
GetCurrentThreadId
GetUserDefaultLCID
SetErrorMode
CreateProcessW
GetCurrentProcess
GetEnvironmentStrings
VirtualAlloc
ResetEvent
GlobalFree
GetEnvironmentStringsW
SetEnvironmentVariableA
CreateMailslotA
SetCurrentDirectoryA
HeapReAlloc
lstrcmpiA
GetUserDefaultLangID
Sleep
SetHandleCount
GetCurrentProcessId
InterlockedIncrement
WideCharToMultiByte
GetSystemTime
GlobalAddAtomA
CreateFileA
GetStringTypeA
CreateThread
CreateSemaphoreA
GetCurrentDirectoryA
Sections
.text Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 154KB - Virtual size: 1024KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 131KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 64B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rdata Size: 205KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ