Static task
static1
Behavioral task
behavioral1
Sample
a999ec13159f6cc07638cb54261b15b1_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a999ec13159f6cc07638cb54261b15b1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a999ec13159f6cc07638cb54261b15b1_JaffaCakes118
-
Size
522KB
-
MD5
a999ec13159f6cc07638cb54261b15b1
-
SHA1
3aea2ff7a39d622bb3f183bd02311e4addb7f98d
-
SHA256
12d9b38ea5accf032c5c04f500a2395f8bd8a7a858434d46844f67cecc6fc1c4
-
SHA512
f580fc50ee19e1b3f417abb14e3b196190ca4994b8db7aa415cca8de6f83cb1c2415761e7d96387d72f1dfd53b5944c9ee4f917f21290252ee8768748f9ac0ed
-
SSDEEP
6144:0fdjdAGh1uUTuYjslKMOrRWoS3/cEniC/Ml1fcBuXqDHIFhYEdBvgJLusSGEQwWX:AdioPoOrRWZdMl+BDHIvNBRshwaGcmc
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a999ec13159f6cc07638cb54261b15b1_JaffaCakes118
Files
-
a999ec13159f6cc07638cb54261b15b1_JaffaCakes118.exe windows:4 windows x86 arch:x86
9d91c357146d9a58de4617c3eadec2ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersion
EnumCalendarInfoW
OpenSemaphoreW
UnmapViewOfFile
WritePrivateProfileStringW
_lopen
GetSystemTimeAdjustment
OpenFile
GetSystemTime
SetFileTime
GetBinaryTypeA
GetLogicalDriveStringsA
GetProfileIntA
GetDiskFreeSpaceExA
SetErrorMode
IsValidLocale
GlobalFindAtomA
GetHandleInformation
GetStringTypeExW
GetSystemInfo
PeekConsoleInputW
GetTempPathW
_llseek
ReleaseMutex
GetProcessHeap
GetThreadPriority
TryEnterCriticalSection
CloseHandle
SetEnvironmentVariableW
GetCommModemStatus
GlobalAddAtomW
ExitProcess
CreateProcessA
WritePrivateProfileStructA
SetupComm
GetSystemDirectoryW
GetDriveTypeW
PulseEvent
SetEvent
LoadLibraryExA
GetCurrentProcess
GlobalReAlloc
FindCloseChangeNotification
GlobalAddAtomA
SetThreadPriorityBoost
SetConsoleActiveScreenBuffer
EnumSystemCodePagesW
GetCommConfig
GlobalFree
ReadFileScatter
EnumSystemCodePagesA
GetTapeParameters
MultiByteToWideChar
GetDateFormatA
GetFullPathNameA
FlushConsoleInputBuffer
SetCommTimeouts
FindFirstFileExW
CreateEventA
lstrcmpiW
lstrcmpA
TlsGetValue
ReadConsoleInputW
GlobalUnlock
FileTimeToLocalFileTime
DeleteCriticalSection
GetCPInfo
VirtualQuery
OutputDebugStringA
VirtualProtect
MoveFileExA
GetNumberFormatW
GetUserDefaultLangID
GetLongPathNameA
user32
GetDialogBaseUnits
EqualRect
SetWinEventHook
WaitForInputIdle
IsWindow
CopyRect
GetMenu
gdi32
Chord
GetClipRgn
Arc
GetWinMetaFileBits
SetBkColor
CreateEllipticRgn
GetObjectType
GetEnhMetaFileHeader
SwapBuffers
CreateCompatibleBitmap
PolyBezier
GetCurrentPositionEx
comdlg32
ReplaceTextW
ChooseFontA
GetSaveFileNameA
advapi32
SetSecurityDescriptorDacl
LogonUserW
InitiateSystemShutdownA
GetSecurityDescriptorLength
OpenThreadToken
AccessCheckAndAuditAlarmA
LookupAccountSidW
RegSaveKeyW
RegSetValueW
StartServiceCtrlDispatcherA
GetSidSubAuthority
LookupPrivilegeValueW
IsTextUnicode
RegUnLoadKeyW
CryptImportKey
CryptHashData
QueryServiceLockStatusW
RegisterEventSourceA
RegLoadKeyW
shell32
DragAcceptFiles
SHFileOperationW
oleaut32
SafeArrayUnaccessData
SysFreeString
VariantCopy
SafeArrayPutElement
comctl32
ord17
shlwapi
SHRegSetUSValueW
StrStrA
StrFormatByteSize64A
PathFindNextComponentW
PathRemoveExtensionW
PathRemoveFileSpecA
StrCpyNW
StrCmpW
StrCatBuffA
PathIsFileSpecA
StrCmpNA
StrChrW
PathIsRootW
PathRelativePathToW
SHDeleteKeyA
PathCanonicalizeA
StrToIntW
PathIsUNCA
Sections
.text Size: 12KB - Virtual size: 153KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 192KB - Virtual size: 188KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ