Static task
static1
Behavioral task
behavioral1
Sample
b1eaef122922c445d7eac90845fbb5c9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b1eaef122922c445d7eac90845fbb5c9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b1eaef122922c445d7eac90845fbb5c9_JaffaCakes118
-
Size
286KB
-
MD5
b1eaef122922c445d7eac90845fbb5c9
-
SHA1
925fbe5d69c7c16a489805a3eddeea5100dcfd79
-
SHA256
9e7aad88d77e61a48c006894fc4a343863bf3c52eaba57d57e5b7acf78bc9cf2
-
SHA512
fd3602f99765f50af53d5db41cd8df3d7ed80c9703b1a3607c9808e1734c6293e2d896736a145263bbe0ed24ff588552800ec89991e0f1588e52daa68ade65f3
-
SSDEEP
6144:92EIw+M9wJdD1G40ztaNP0g4c6He3wT66vlmmAFKFoJfTgTIuMfFE9:knw+YwD040EBq2JwtMu9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b1eaef122922c445d7eac90845fbb5c9_JaffaCakes118
Files
-
b1eaef122922c445d7eac90845fbb5c9_JaffaCakes118.exe windows:4 windows x86 arch:x86
726cb7ffccfcd0b8ad984f41d192fcdd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegCreateKeyExA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
comctl32
InitCommonControls
kernel32
AllocConsole
AreFileApisANSI
CloseHandle
CreateDirectoryA
CreateFileA
CreateMutexA
CreateProcessA
CreateSemaphoreA
DeleteFileA
DuplicateHandle
EnterCriticalSection
ExitProcess
FindClose
FindFirstFileA
FindNextFileA
FindResourceA
FreeEnvironmentStringsA
GetCommandLineA
GetCommandLineW
GetConsoleOutputCP
GetConsoleTitleA
GetCurrentProcess
GetCurrentProcessId
GetEnvironmentStrings
GetEnvironmentVariableA
GetExitCodeProcess
GetFileAttributesA
GetFullPathNameA
GetLastError
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
GetShortPathNameA
GetShortPathNameW
GetStartupInfoA
GetTempFileNameA
GetTempPathA
GetTickCount
GetUserDefaultLCID
GetVersionExA
GetWindowsDirectoryA
InitializeCriticalSection
InterlockedIncrement
LeaveCriticalSection
LoadLibraryA
LoadResource
LockResource
MultiByteToWideChar
ReadFile
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryA
SearchPathA
SetConsoleTitleA
SetCurrentDirectoryA
SetEnvironmentVariableA
SetFilePointer
SetLastError
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcpynA
lstrlenA
msvcrt
_close
_fileno
_fstat
_isatty
_lseek
_open
_read
_stricmp
_wcslwr
_write
_HUGE
__getmainargs
__mb_cur_max
__p__environ
__set_app_type
_assert
_cexit
_errno
_fileno
_fmode
_fpreset
_iob
_isctype
_mkdir
_pctype
_putenv
_rmdir
_setmode
_strupr
_tempnam
abort
atexit
atoi
ctime
difftime
exit
fclose
fflush
fgets
fopen
fprintf
fread
free
fseek
fwprintf
fwrite
getc
getenv
malloc
memchr
memcpy
memmove
memset
mktime
printf
rand
remove
signal
sprintf
srand
strcat
strchr
strcmp
strcpy
strncmp
strncpy
strrchr
strstr
strtok
strtol
strtoul
swprintf
time
vfprintf
wcschr
wcscmp
wcscpy
wcslen
wcsncmp
wcsncpy
shell32
SHGetDesktopFolder
SHGetMalloc
SHGetPathFromIDListA
user32
DispatchMessageA
EnumWindows
ExitWindowsEx
FindWindowA
GetLastActivePopup
GetMessageA
GetWindowTextA
GetWindowThreadProcessId
IsIconic
IsWindowVisible
MessageBoxA
MessageBoxW
SetForegroundWindow
ShowWindow
TranslateMessage
Sections
.text Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 49KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE