Static task
static1
Behavioral task
behavioral1
Sample
bac9b1adb5389adc6906ad83083a3d71_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
bac9b1adb5389adc6906ad83083a3d71_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bac9b1adb5389adc6906ad83083a3d71_JaffaCakes118
-
Size
339KB
-
MD5
bac9b1adb5389adc6906ad83083a3d71
-
SHA1
1a0e774141b03c5ca595b5adb2845ace6f6de233
-
SHA256
033983ce109e25a2812e9145dc961806b4b31cdf79b5173862aba27ddb9c68ad
-
SHA512
a169782b54dc15ee35f838cd5c5856224dcce1ffd8b35aa1367fd66e4af1747ddcb108c114ca72064c89243166870f789d5db99f83396da63d19571cef74f36c
-
SSDEEP
6144:7JJJTFH5MoBxKCRCRfH5qNtDQuWNCJt07tG10vD22nQN2oG+Sptt:7J3PcCR+5q8nNYtIK0RQN2oK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bac9b1adb5389adc6906ad83083a3d71_JaffaCakes118
Files
-
bac9b1adb5389adc6906ad83083a3d71_JaffaCakes118.exe windows:5 windows x86 arch:x86
9610d671dd5dd0164dd321802fc709aa
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
advapi32
LsaQueryForestTrustInformation
CryptDestroyKey
WmiFreeBuffer
StopTraceA
SetSecurityInfo
ImpersonateSelf
LsaLookupPrivilegeDisplayName
SetSecurityInfoExW
TraceMessageVa
IdentifyCodeAuthzLevelW
EnumServicesStatusExW
GetTraceEnableFlags
LookupPrivilegeDisplayNameA
RegisterEventSourceW
GetKernelObjectSecurity
LsaGetUserName
CryptSetHashParam
CredWriteW
SetSecurityDescriptorRMControl
ElfOpenEventLogW
RegSaveKeyW
CredWriteDomainCredentialsW
GetNamedSecurityInfoA
NotifyChangeEventLog
SystemFunction040
LsaSetForestTrustInformation
RegQueryInfoKeyA
LockServiceDatabase
ObjectOpenAuditAlarmW
imagehlp
RemovePrivateCvSymbolicEx
ImagehlpApiVersion
SymFromAddr
SymUnloadModule64
ImageDirectoryEntryToDataEx
FindFileInPath
GetTimestampForLoadedLibrary
SymEnumerateSymbolsW
SymGetSymFromName64
UnMapAndLoad
SymRegisterCallback
SymGetSymFromAddr
SymFunctionTableAccess
SymFromName
SymGetModuleInfoW64
SymEnumTypes
StackWalk64
ImageRemoveCertificate
SymUnDName64
EnumerateLoadedModules
ReBaseImage
SymSetOptions
ImageAddCertificate
SymRegisterFunctionEntryCallback64
SymGetSymNext
wshtcpip
WSHSetSocketInformation
WSHGetProviderGuid
WSHGetSockaddrType
WSHGetSocketInformation
WSHIoctl
WSHJoinLeaf
WSHGetWildcardSockaddr
WSHOpenSocket
WSHEnumProtocols
WSHAddressToString
WSHGetWSAProtocolInfo
WSHStringToAddress
WSHGetWinsockMapping
WSHOpenSocket2
WSHNotify
WSHGetBroadcastSockaddr
kernel32
SetEvent
DeactivateActCtx
EndUpdateResourceA
EnumerateLocalComputerNamesW
OutputDebugStringW
OpenSemaphoreW
GetVolumePathNameA
QueryPerformanceCounter
IsDBCSLeadByte
SetConsoleFont
SetEndOfFile
SleepEx
AllocateUserPhysicalPages
GetProfileSectionW
LZInit
DeleteTimerQueue
lstrcatA
MoveFileExA
LoadLibraryA
OpenThread
GetDriveTypeW
GetConsoleMode
SetFileApisToANSI
WritePrivateProfileStructW
FindFirstVolumeA
GetCurrentProcessId
TermsrvAppInstallMode
SetConsoleMaximumWindowSize
GetStartupInfoW
VirtualLock
SetConsoleNlsMode
Sleep
GetCurrentThreadId
GetFileAttributesA
UnmapViewOfFile
GetTickCount
LCMapStringA
LZCreateFileW
CreateMailslotW
GetCPInfo
GetThreadPriority
LocalFlags
SetThreadIdealProcessor
CloseHandle
GetSystemDirectoryW
GetUserDefaultUILanguage
GetLogicalDrives
Module32Next
GetDiskFreeSpaceExW
ReadConsoleOutputW
UnregisterWaitEx
DefineDosDeviceA
VirtualAlloc
SetFileValidData
QueryDosDeviceA
msvcp60
?find_first_of@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEIGI@Z
??0?$money_get@DV?$istreambuf_iterator@DU?$char_traits@D@std@@@std@@@std@@QAE@I@Z
_Stold
?replace@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PAD0ID@Z
?tolower@?$ctype@G@std@@QBEPBGPAGPBG@Z
?replace@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEAAV12@PAG0ABV12@@Z
??_7?$basic_fstream@GU?$char_traits@G@std@@@std@@6B@
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
??_7bad_typeid@std@@6B@
?isfx@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEXXZ
?size@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEIXZ
?_Init@?$basic_streambuf@GU?$char_traits@G@std@@@std@@IAEXPAPAG0PAH001@Z
??4bad_cast@std@@QAEAAV01@ABV01@@Z
??4out_of_range@std@@QAEAAV01@ABV01@@Z
?_Getcat@?$num_put@GV?$ostreambuf_iterator@GU?$char_traits@G@std@@@std@@@std@@SAIXZ
?unget@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?end@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??_7?$moneypunct@D$00@std@@6B@
?_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ
?good@ios_base@std@@QBE_NXZ
?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QAEAAV12@XZ
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHIIABV12@II@Z
??Gstd@@YA?AV?$complex@N@0@ABV10@@Z
?is_open@?$basic_ifstream@DU?$char_traits@D@std@@@std@@QBE_NXZ
?_Stinit@?1??_Init@?$basic_filebuf@DU?$char_traits@D@std@@@std@@IAEXPAU_iobuf@@W4_Initfl@23@@Z@4HA
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 252KB - Virtual size: 668KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 336B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ