Static task
static1
Behavioral task
behavioral1
Sample
b79c63dfedfda156bff06caaa338d0cc_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b79c63dfedfda156bff06caaa338d0cc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b79c63dfedfda156bff06caaa338d0cc_JaffaCakes118
-
Size
154KB
-
MD5
b79c63dfedfda156bff06caaa338d0cc
-
SHA1
0babbdad7df658659f9e49d91c7099c35d57b9a5
-
SHA256
7c94c178998fbccce7607a37391c1ab939d3b232af1e6a9c9dbfe366bbe67380
-
SHA512
d760ff391d64e6ed0ce71c63faabf357fb76fdd615ce9ba312d703514162a02c633a0669d525b68cbcfcd40984f35f2d8287bd8561cdef4bb9b2dc5b0b13a31b
-
SSDEEP
3072:euQrqT6ba4GSXxdFeFLE8x6Xa+bxn+wQ4OUa36VO0Bf+cdEPRqYWs+rwGm9u14:efbrGQeIVt+wdOU80Oqf+ZPRus+rwvuy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b79c63dfedfda156bff06caaa338d0cc_JaffaCakes118
Files
-
b79c63dfedfda156bff06caaa338d0cc_JaffaCakes118.exe windows:0 windows x86 arch:x86
6fe2965b17b413f87efdc8a9645ecafe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_initterm
atoi
wcsstr
sprintf
wcscat
wcscmp
_cexit
_purecall
_controlfp
_wcsicmp
malloc
_onexit
atol
_XcptFilter
__initenv
wcschr
wcscpy
swprintf
_exit
srand
time
wcslen
wcstoul
__setusermatherr
rand
__dllonexit
exit
__getmainargs
free
_c_exit
__set_app_type
advapi32
RegisterServiceCtrlHandlerW
StartServiceCtrlDispatcherW
SetServiceStatus
kernel32
EnumSystemLocalesA
SetUnhandledExceptionFilter
SetFileApisToOEM
SetConsoleInputExeNameA
GetProcessIoCounters
SetFileAttributesW
GetTimeFormatW
_hread
GetLastError
BackupRead
IsBadStringPtrW
GetComputerNameW
GetFileType
FindFirstVolumeA
CopyLZFile
GetLogicalDrives
ConvertDefaultLocale
GetConsoleKeyboardLayoutNameW
SetLastConsoleEventActive
CreateWaitableTimerA
LeaveCriticalSection
CreateEventA
ExitProcess
PeekNamedPipe
DeleteCriticalSection
RegisterConsoleVDM
GetComputerNameExA
ReadFile
SetMailslotInfo
AddVectoredExceptionHandler
InterlockedIncrement
GetPrivateProfileSectionW
GetProfileStringW
VirtualAllocEx
LockFileEx
ZombifyActCtx
EnumSystemLanguageGroupsA
CloseHandle
WriteConsoleInputVDMW
UnhandledExceptionFilter
ReadConsoleInputExA
SetThreadLocale
SleepEx
QueryPerformanceCounter
InterlockedDecrement
lstrcat
TerminateProcess
DebugBreakProcess
SetConsoleTextAttribute
GlobalCompact
CreateFileW
SwitchToThread
HeapUnlock
GlobalGetAtomNameA
GetTickCount
GetProcessHeap
CancelIo
FreeLibraryAndExitThread
CloseHandle
CreateMailslotW
EnterCriticalSection
LeaveCriticalSection
ReadConsoleInputW
SetConsoleNlsMode
GetCurrentProcessId
WriteConsoleOutputW
WaitForSingleObject
LocalFree
EnumResourceLanguagesA
CreateSemaphoreW
FileTimeToSystemTime
DnsHostnameToComputerNameW
FoldStringW
GetCurrentProcess
ReleaseSemaphore
FindAtomW
RaiseException
OpenFileMappingW
EnumLanguageGroupLocalesA
GetStringTypeExA
WinExec
CreateTimerQueueTimer
QueryDosDeviceA
GetSystemTimeAsFileTime
rpcrt4
RpcBindingFree
UuidIsNil
RpcRevertToSelf
RpcMgmtWaitServerListen
RpcBindingFromStringBindingW
NdrServerCall2
RpcServerListen
UuidToStringW
RpcStringBindingParseW
RpcRaiseException
RpcStringFreeW
RpcServerUseProtseqEpW
RpcMgmtStopServerListening
UuidFromStringW
RpcMgmtSetCancelTimeout
RpcServerRegisterIf
RpcImpersonateClient
NdrClientCall2
RpcStringBindingComposeW
netapi32
DsRoleFreeMemory
NetRegisterDomainNameChangeNotification
NetApiBufferFree
NetGetDCName
NetServerEnum
DsGetDcNameW
DsRoleGetPrimaryDomainInformation
activeds
ord13
ord15
adsldpc
ADSIGetColumn
ADSIGetFirstRow
ADSISetSearchPreference
ADSIGetObjectAttributes
ADSISetObjectAttributes
ADSIFreeColumn
ADSIGetNextRow
ADSICloseDSObject
ADSIDeleteDSObject
ADSICloseSearchHandle
ADSIOpenDSObject
ADSICreateDSObject
ADSIExecuteSearch
user32
wsprintfW
secur32
SealMessage
SaslAcceptSecurityContext
LsaLogonUser
LsaGetLogonSessionData
RevertSecurityContext
QueryCredentialsAttributesW
SaslGetProfilePackageW
InitializeSecurityContextW
wininet
InternetDialA
InternetWriteFileExW
DeleteUrlCacheGroup
InternetConfirmZoneCrossingA
HttpEndRequestA
SetUrlCacheEntryGroupA
FindFirstUrlCacheEntryExW
InternetLockRequestFile
InternetCheckConnectionA
HttpEndRequestW
GetUrlCacheGroupAttributeW
FtpFindFirstFileW
HttpQueryInfoA
HttpQueryInfoW
InternetSetCookieW
UpdateUrlCacheContentPath
RegisterUrlCacheNotification
FtpSetCurrentDirectoryA
InternetTimeToSystemTime
IsUrlCacheEntryExpiredW
InternetGetCookieExW
Sections
.text Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Qg Size: 2KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.soDv Size: 1KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zjbBg Size: 3KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.YoOer Size: 3KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.uG Size: 2KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bG Size: 2KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ