Static task
static1
Behavioral task
behavioral1
Sample
adf1588e1f73c0bb7e13f40e3cdadbbc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
adf1588e1f73c0bb7e13f40e3cdadbbc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
adf1588e1f73c0bb7e13f40e3cdadbbc_JaffaCakes118
-
Size
288KB
-
MD5
adf1588e1f73c0bb7e13f40e3cdadbbc
-
SHA1
ff176c2e70d0b3c47ba18fe14c7973a9f79c42d9
-
SHA256
35dda97ab8cd04463ded2b4a08c98fe4e94fd0c78da7f63a2c4f9b85aa76da32
-
SHA512
6a2895b23bb6b0692f9be055c6ecc37180309bff6ee24aea5c16e1b5ccf5e1799d4fd46d47c2b9b46062bb1db697330b1250365f37ed06b15f69b484dbff381b
-
SSDEEP
6144:37MgojAlxm4hO/4wsdBfIOW6Kafv/Pfv/Pfv/Pfv/PMcs8Mcs8Mcs8Mg/Qa6QO+0:rMpA104wsdBfIOW6Kafv/Pfv/Pfv/Pfm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource adf1588e1f73c0bb7e13f40e3cdadbbc_JaffaCakes118
Files
-
adf1588e1f73c0bb7e13f40e3cdadbbc_JaffaCakes118.exe windows:4 windows x86 arch:x86
ec175680921a2715662de338b92377d1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegDeleteValueA
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueA
RegCloseKey
FreeSid
RegOpenKeyExA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyA
RegQueryInfoKeyA
kernel32
lstrcatA
GetFileAttributesA
lstrlenA
lstrcmpiA
GetPrivateProfileStringA
GetCurrentProcess
GetPrivateProfileIntA
lstrcpyA
GetModuleFileNameA
RemoveDirectoryA
FindClose
FindNextFileA
DeleteFileA
SetFileAttributesA
lstrcmpA
FindFirstFileA
_lclose
_llseek
_lopen
GetWindowsDirectoryA
CreateDirectoryA
GetSystemDirectoryA
GlobalUnlock
GlobalFree
GlobalLock
GlobalAlloc
LoadResource
CreateMutexA
GetLastError
SetEvent
CreateEventA
SetCurrentDirectoryA
TerminateThread
ResetEvent
CreateThread
GetVersionExA
FormatMessageA
FreeLibrary
GetProcAddress
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetTempPathA
LoadLibraryA
FreeResource
LockResource
SizeofResource
CreateFileA
ReadFile
WriteFile
LocalAlloc
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetTempFileNameA
GetSystemInfo
GetDiskFreeSpaceA
FindResourceA
GetDriveTypeA
GetVolumeInformationA
GetCurrentDirectoryA
LoadLibraryExA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
LocalFree
UnhandledExceptionFilter
FreeEnvironmentStringsA
MultiByteToWideChar
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetFileType
GetStdHandle
DeleteCriticalSection
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
HeapDestroy
HeapCreate
VirtualFree
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
HeapFree
HeapAlloc
VirtualAlloc
GetLocaleInfoA
GetLocaleInfoW
FlushFileBuffers
SetStdHandle
CloseHandle
lstrcpynA
SetFilePointer
RtlUnwind
gdi32
GetDeviceCaps
user32
PeekMessageA
LoadStringA
GetDesktopWindow
wsprintfA
ExitWindowsEx
CharPrevA
CharNextA
SetWindowLongA
GetWindowLongA
CallWindowProcA
GetDlgItem
SetForegroundWindow
SetWindowTextA
SendDlgItemMessageA
GetDlgItemTextA
EnableWindow
SendMessageA
SetDlgItemTextA
DispatchMessageA
MsgWaitForMultipleObjects
MessageBoxA
SetWindowPos
ReleaseDC
GetDC
GetWindowRect
ShowWindow
DialogBoxIndirectParamA
MessageBeep
EndDialog
comctl32
ord17
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 199KB - Virtual size: 206KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ