Static task
static1
Behavioral task
behavioral1
Sample
b6a80bee1f7d67e780d3f5d0181b4808_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
b6a80bee1f7d67e780d3f5d0181b4808_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b6a80bee1f7d67e780d3f5d0181b4808_JaffaCakes118
-
Size
230KB
-
MD5
b6a80bee1f7d67e780d3f5d0181b4808
-
SHA1
ed8f37e33bbaba99cae3ec680b8b5ee17dadbffc
-
SHA256
884c4fb89ddad675cf1b5c083c88ee5a82990115cff94181442e6641d3f09be9
-
SHA512
108f223cb4fb5e07ae1b9aa02b415d54702818279154a4a0284715b377b37bd57786e59b4f30e09f70fa062d1fbab3ec5ebf5734b325cd12fd1c362e5e85a88b
-
SSDEEP
3072:KodE7wfZnjJX4HmveqoDI9LqtfTUAL4lf1KwIf0Yt6Q3f898LrAh7GKKia4:hXZjJoH8N0iMTP0KwIfV9jQ7Fa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b6a80bee1f7d67e780d3f5d0181b4808_JaffaCakes118
Files
-
b6a80bee1f7d67e780d3f5d0181b4808_JaffaCakes118.exe windows:4 windows x86 arch:x86
f3ce384869e3df9695b86ec8abc8a233
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
hccutils
LoadSTRING
InitializeKeyHook
FindResources
LoadSTRINGFromHKCU
kernel32
GetProcAddress
GetModuleHandleA
CreateProcessA
FreeLibrary
LoadLibraryA
GetVersionExA
CloseHandle
GetLastError
InterlockedDecrement
SearchPathA
CompareFileTime
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
RaiseException
InitializeCriticalSection
DeleteCriticalSection
lstrlenA
lstrcmpiA
InterlockedIncrement
GetModuleFileNameA
IsDBCSLeadByte
SizeofResource
LoadResource
FindResourceA
LoadLibraryExA
GetWindowsDirectoryA
Sleep
CreateMutexA
GetCurrentThreadId
GetCommandLineA
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
FlushFileBuffers
GetStringTypeW
GetStringTypeA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
HeapSize
GetStdHandle
WriteFile
HeapCreate
HeapDestroy
ExitProcess
LCMapStringW
LCMapStringA
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetOEMCP
GetCPInfo
GetStartupInfoA
HeapReAlloc
VirtualQuery
GetSystemInfo
VirtualProtect
RtlUnwind
IsDebuggerPresent
SetFilePointer
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetConsoleMode
GetConsoleCP
LocalFree
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
HeapAlloc
GetProcessHeap
HeapFree
InterlockedCompareExchange
GetThreadLocale
GetLocaleInfoA
InterlockedExchange
GetACP
user32
GetKeyboardLayout
MapVirtualKeyA
GetKeyNameTextA
LoadCursorA
GetClassInfoExA
SetWindowLongA
RegisterClassA
CreateWindowExA
SetTimer
GetMessageA
DispatchMessageA
RegisterClassExA
IsWindow
CreateDialogParamA
ShowWindow
PostQuitMessage
RegisterHotKey
DestroyWindow
GetDlgItem
GetDesktopWindow
GetWindowRect
SetWindowTextA
SendMessageA
PostThreadMessageA
CharNextA
MessageBoxA
GetCursorPos
GetWindowLongA
EnumDisplaySettingsA
wsprintfA
UnregisterClassA
CallWindowProcA
DefWindowProcA
UnregisterHotKey
PeekMessageA
advapi32
RegCreateKeyExA
RegQueryInfoKeyA
RegDeleteValueA
RegEnumKeyExA
RegDeleteKeyA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteExA
ole32
CoRevokeClassObject
CoRegisterClassObject
CoTaskMemAlloc
CoTaskMemFree
CoSuspendClassObjects
StringFromGUID2
CoUninitialize
CoInitialize
CoTaskMemRealloc
CoCreateInstance
oleaut32
VarUI4FromStr
RegisterTypeLi
UnRegisterTypeLi
LoadTypeLi
SysStringLen
SysAllocString
SysFreeString
VariantClear
Sections
.text Size: 108KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.drdata Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE