Static task
static1
Behavioral task
behavioral1
Sample
ce113fa765bab7cf4d25a1b471153dbe_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ce113fa765bab7cf4d25a1b471153dbe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ce113fa765bab7cf4d25a1b471153dbe_JaffaCakes118
-
Size
1.7MB
-
MD5
ce113fa765bab7cf4d25a1b471153dbe
-
SHA1
fac4ae95b0d50ae06a6a8decdfe7a46cc6573f16
-
SHA256
9ef3b328c35938772d0e594e91951fb7115ac2a2dc44c9b49f3c69452932c78c
-
SHA512
7d7a81979ea4e26a7404eed2fea838c68b5cfb14837225f0c9b6ba3a8c24489ad228d2915415103f6bf17bdcbe2f3bc108676190d4fe4112b7f8e01887f71976
-
SSDEEP
24576:T6JgZLao1Rvc2svYC98zixogVNIrPcTIbA+z/hFD3iw79S608DqfNKp:7LaxF4mrVNCP7zh5h7H1ms
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ce113fa765bab7cf4d25a1b471153dbe_JaffaCakes118
Files
-
ce113fa765bab7cf4d25a1b471153dbe_JaffaCakes118.exe windows:4 windows x86 arch:x86
2470e279647f204726d1b65835aa150b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempPathW
GetUserDefaultLangID
GetBinaryTypeA
Beep
GetConsoleMode
FatalAppExitA
FlushConsoleInputBuffer
DosDateTimeToFileTime
GlobalAddAtomW
EndUpdateResourceA
SetFileAttributesA
LoadLibraryExW
GetBinaryTypeW
_lopen
GetDiskFreeSpaceW
SetConsoleActiveScreenBuffer
GetLargestConsoleWindowSize
GetSystemDefaultLangID
LeaveCriticalSection
WritePrivateProfileStringW
FreeEnvironmentStringsA
EnumSystemCodePagesW
GetDateFormatA
GlobalAddAtomA
SetConsoleCursorPosition
SetConsoleTitleA
VirtualQueryEx
PurgeComm
GetPrivateProfileSectionW
SetEnvironmentVariableW
GetTickCount
WriteFile
SetEvent
FreeLibraryAndExitThread
CreatePipe
GetFullPathNameA
IsProcessorFeaturePresent
GetConsoleCursorInfo
GetUserDefaultLCID
EnumResourceNamesW
GetPrivateProfileStringW
GetShortPathNameA
GetCommModemStatus
EnumTimeFormatsW
CreateDirectoryExA
CreateNamedPipeW
WritePrivateProfileStringA
ExpandEnvironmentStringsW
GetFileAttributesA
SetMailslotInfo
lstrcpynA
SetCommTimeouts
GetFileType
GetCommandLineW
DebugBreak
VirtualQuery
GetLogicalDriveStringsA
WriteProcessMemory
GetLocaleInfoW
InitializeCriticalSection
SetSystemTime
SetProcessAffinityMask
GetVersion
SetThreadLocale
GetCurrentProcess
OpenSemaphoreW
PeekConsoleInputW
IsBadWritePtr
GetFileInformationByHandle
OutputDebugStringA
FreeLibrary
CreateDirectoryA
VirtualProtect
MoveFileW
ExitProcess
user32
GetScrollBarInfo
GetClassLongW
CheckRadioButton
DialogBoxIndirectParamW
GetKeyboardLayoutList
GetDialogBaseUnits
UnregisterClassW
SetWindowLongW
DrawEdge
gdi32
CreateMetaFileA
EnumObjects
SetPixelV
GetTextExtentPoint32W
comdlg32
GetSaveFileNameA
ReplaceTextA
advapi32
RegQueryValueA
RegLoadKeyA
CryptDeriveKey
LogonUserA
SetTokenInformation
ChangeServiceConfigW
GetNamedSecurityInfoW
EnumServicesStatusA
DeleteService
GetTokenInformation
RegQueryInfoKeyW
SetNamedSecurityInfoW
CloseServiceHandle
GetExplicitEntriesFromAclW
InitiateSystemShutdownW
SetPrivateObjectSecurity
SetServiceStatus
ObjectCloseAuditAlarmA
LookupAccountSidA
LookupPrivilegeNameA
SetEntriesInAclW
shell32
SHBrowseForFolderA
SHLoadInProc
DragAcceptFiles
SHGetSettings
SHGetPathFromIDListA
ole32
CoFreeAllLibraries
OleLockRunning
OleFlushClipboard
OleRegGetUserType
CoQueryProxyBlanket
oleaut32
QueryPathOfRegTypeLi
comctl32
ImageList_GetBkColor
ImageList_EndDrag
ImageList_GetImageCount
shlwapi
SHRegGetBoolUSValueW
wvnsprintfW
StrCpyNW
PathRemoveBackslashW
PathIsDirectoryEmptyW
PathRemoveFileSpecW
PathAddBackslashA
StrCmpNA
SHQueryValueExW
PathStripToRootA
StrDupW
PathQuoteSpacesA
PathCombineW
PathRelativePathToW
PathIsNetworkPathW
StrRStrIW
PathIsRelativeW
Sections
.text Size: 3KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ