Static task
static1
Behavioral task
behavioral1
Sample
c8a4259f24753e02f98f3ce640272358_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c8a4259f24753e02f98f3ce640272358_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c8a4259f24753e02f98f3ce640272358_JaffaCakes118
-
Size
137KB
-
MD5
c8a4259f24753e02f98f3ce640272358
-
SHA1
fa57c641edc834773fe3a832175b628fee4cec07
-
SHA256
901d0bca0fcfa52101fc816d4fce965029b33ed94483feff693211152d4c3b08
-
SHA512
3cd73bc4992a4d0758674808b3a208d96a28b9e948e2fc5ae04a5553d2fb0f8f42ba2bcdf7e30525393976c048522ddf1554073b45e3c1b789bcda4bcff28ba0
-
SSDEEP
3072:DdlXF6simEa2vTFUoCyA3Uim9FS13SuoLbuodnSTJds5Pk+o:DMs730+ksyi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c8a4259f24753e02f98f3ce640272358_JaffaCakes118
Files
-
c8a4259f24753e02f98f3ce640272358_JaffaCakes118.exe windows:5 windows x86 arch:x86
b09ac0f5cff556316fae69f2b81f7912
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
GetStartupInfoA
CreateProcessW
DeleteFileW
MapViewOfFile
CreateEventA
DuplicateHandle
GetSystemDefaultLangID
GetModuleFileNameW
SetEvent
ReleaseMutex
CopyFileW
GetWindowsDirectoryW
GetTempFileNameW
lstrlenW
GetVersionExW
ExpandEnvironmentStringsW
SearchPathW
lstrcpyW
lstrcpynW
GetDriveTypeW
lstrcmpiA
GetLocalTime
OpenEventA
GetTempFileNameA
OpenProcess
CreateRemoteThread
VirtualAllocEx
WriteProcessMemory
QueryDosDeviceA
TerminateProcess
FileTimeToSystemTime
lstrcmpA
CreateFileW
LoadLibraryW
lstrcmpiW
CreateDirectoryA
FormatMessageW
LocalFree
LocalAlloc
CreateFileMappingA
MapViewOfFileEx
FindResourceA
LoadResource
SetEndOfFile
SetFilePointer
WriteFile
UnmapViewOfFile
FlushFileBuffers
GetFileSize
ReadFile
ExpandEnvironmentStringsA
FindFirstFileA
FindNextFileA
FindClose
CreateFileA
DeviceIoControl
GetSystemDirectoryA
GetDiskFreeSpaceA
FreeLibrary
CreateProcessA
GetExitCodeProcess
DefineDosDeviceA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetVersionExA
GetSystemInfo
GetEnvironmentVariableA
CreateMutexA
SetUnhandledExceptionFilter
FormatMessageA
ExitProcess
lstrcpynA
lstrcpyA
WaitForSingleObject
CloseHandle
CreateThread
GetModuleHandleA
GetCurrentProcess
Sleep
DeleteFileA
WideCharToMultiByte
GetWindowsDirectoryA
VirtualAlloc
SetCurrentDirectoryA
LoadLibraryA
GetFullPathNameA
CopyFileA
SetFileAttributesA
MultiByteToWideChar
GetProcAddress
RemoveDirectoryA
MoveFileExA
lstrlenA
SetLastError
GetModuleFileNameA
SetEnvironmentVariableA
GetFileAttributesA
MoveFileA
GetLastError
CompareFileTime
comctl32
PropertySheetW
CreatePropertySheetPageW
setupapi
SetupFindNextLine
SetupFindFirstLineA
SetupCloseInfFile
SetupOpenInfFileA
SetupGetStringFieldA
SetupSetDirectoryIdA
SetupGetSourceInfoA
SetupFindFirstLineW
SetupGetStringFieldW
SetupGetTargetPathW
SetupScanFileQueueA
SetupGetLineByIndexA
SetupGetFieldCount
SetupGetLineCountA
SetupDiGetClassDevsA
SetupDiEnumDeviceInfo
SetupDiGetDeviceInstanceIdA
SetupDiGetDeviceInstallParamsA
SetupDiOpenDevRegKey
SetupGetSourceFileLocationA
SetupDiGetDeviceRegistryPropertyA
SetupDiSetDeviceInstallParamsA
SetupDiBuildDriverInfoList
SetupDiGetDriverInfoDetailA
SetupDiEnumDriverInfoA
SetupDiDestroyDriverInfoList
SetupGetTargetPathA
SetupCopyErrorA
SetupDeleteErrorA
SetupPromptForDiskA
SetupOpenFileQueue
SetupInstallFilesFromInfSectionA
SetupGetBinaryField
SetupGetIntField
SetupGetLineTextW
SetupGetLineTextA
SetupDecompressOrCopyFileA
SetupInstallFromInfSectionA
SetupDefaultQueueCallbackA
SetupDefaultQueueCallbackW
SetupCommitFileQueueA
SetupInitDefaultQueueCallbackEx
user32
wvsprintfW
MessageBoxW
SendDlgItemMessageA
ShowWindow
SendMessageA
GetDlgItem
LoadStringW
LoadStringA
EndDialog
SetForegroundWindow
SendMessageW
PostMessageA
SetWindowTextW
SetWindowLongA
GetWindowLongA
LoadIconA
MessageBoxA
SetDlgItemTextA
DialogBoxParamA
SetWindowTextA
DialogBoxParamW
SetDlgItemTextW
DestroyWindow
GetParent
ntdll
_snprintf
_strnicmp
sprintf
NtClose
NtAdjustPrivilegesToken
NtOpenProcessToken
NtQuerySystemInformation
RtlCharToInteger
RtlFreeUnicodeString
RtlAnsiStringToUnicodeString
RtlInitAnsiString
NtQueryInformationProcess
NtShutdownSystem
RtlUnwind
strstr
_strlwr
strncpy
_strcmpi
strrchr
_itoa
strchr
_chkstk
wcslen
wcscpy
_snwprintf
_stricmp
ole32
CoInitialize
CoUninitialize
msvcrt
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_initterm
_controlfp
_open
__getmainargs
_acmdln
_cexit
malloc
free
_strdup
strcspn
strtoul
memmove
swprintf
calloc
wcscmp
strspn
atol
strpbrk
_close
_lseek
_read
isdigit
_vsnprintf
atoi
wcstoul
exit
_wcsicmp
_c_exit
_exit
_XcptFilter
advapi32
RegEnumKeyA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegRestoreKeyA
RegCreateKeyExA
SetFileSecurityA
GetServiceDisplayNameA
ControlService
CloseServiceHandle
QueryServiceStatus
OpenServiceA
StartServiceA
OpenSCManagerA
EnumDependentServicesA
GetLengthSid
GetTokenInformation
AllocateAndInitializeSid
OpenProcessToken
DeregisterEventSource
ReportEventA
RegisterEventSourceA
AdjustTokenPrivileges
SetNamedSecurityInfoA
GetNamedSecurityInfoA
UnlockServiceDatabase
ChangeServiceConfigA
QueryServiceConfigA
LockServiceDatabase
GetFileSecurityA
InitiateSystemShutdownA
RegOpenKeyA
RegEnumKeyExA
RegQueryInfoKeyA
RegQueryValueExW
RegOpenKeyExW
OpenServiceW
RegDeleteValueA
gdi32
CreateFontIndirectA
GetObjectA
shell32
SHGetSpecialFolderPathA
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
psapi
GetModuleFileNameExA
userenv
ord138
ord121
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 213KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE