Static task
static1
Behavioral task
behavioral1
Sample
d057b71b13a5de541c4d29266dde0d4c_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d057b71b13a5de541c4d29266dde0d4c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d057b71b13a5de541c4d29266dde0d4c_JaffaCakes118
-
Size
759KB
-
MD5
d057b71b13a5de541c4d29266dde0d4c
-
SHA1
37eb6c719c20a44cf14dbc0c574e1fc4d35de232
-
SHA256
bba27a62d8cd7a6371f226226a69583d1e625758d87ab96df0a567345d6f6c5b
-
SHA512
332e38603b1825a5a2c72eb68c52cf951f497ec7ae42979008bbbe0a165fff202be182f2668bb64f625cee34635703775f8609a6dd89274ae2c060a2b1173a64
-
SSDEEP
12288:D4u/SVZfRgCt+cD+cD+cD+cD+cD+cD+cD+cD+cD+cD+ca:ku/cZJg+FFFFFFFFFFa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d057b71b13a5de541c4d29266dde0d4c_JaffaCakes118
Files
-
d057b71b13a5de541c4d29266dde0d4c_JaffaCakes118.exe windows:4 windows x86 arch:x86
0293778bc9a64bfd8aaca4cd46a22fe6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
kernel32
FindFirstFileA
FormatMessageA
ReadFile
CreateProcessA
GetExitCodeProcess
GetVersion
FindClose
GetDiskFreeSpaceA
GetModuleHandleA
CreateDirectoryA
GetEnvironmentVariableA
GetCurrentThreadId
GetCurrentProcess
FlushInstructionCache
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
RemoveDirectoryA
MulDiv
OutputDebugStringA
LoadLibraryExA
EnumResourceLanguagesA
GetSystemDefaultLangID
GetUserDefaultLangID
GetTempPathA
GetTempFileNameA
FindNextFileA
GetLogicalDriveStringsA
GetDriveTypeA
GetSystemDirectoryA
GetSystemTime
GlobalMemoryStatus
OpenProcess
TerminateProcess
CreateNamedPipeA
ConnectNamedPipe
SearchPathA
InterlockedIncrement
InterlockedDecrement
IsDBCSLeadByte
lstrcpynA
lstrlenW
GetShortPathNameA
CreateMutexA
SetCurrentDirectoryA
GetFileAttributesA
SetFileAttributesA
CopyFileA
ExitProcess
DebugBreak
HeapSize
HeapReAlloc
HeapDestroy
LocalAlloc
MultiByteToWideChar
lstrlenA
GlobalAlloc
GlobalFree
GetCommandLineA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
lstrcatA
lstrcpyA
VirtualProtect
GlobalUnlock
GetStartupInfoA
GlobalLock
GetProcessHeap
HeapFree
lstrcmpA
GetStringTypeExA
FreeLibrary
lstrcmpiA
GetModuleFileNameA
GetProcAddress
LoadLibraryA
ResetEvent
FlushFileBuffers
Sleep
WriteFile
MoveFileA
DeleteFileA
GetFileSize
SetFilePointer
CreateFileA
CreateEventA
SetEvent
CreateThread
CloseHandle
TerminateThread
GetExitCodeThread
WaitForSingleObject
InitializeCriticalSection
DeleteCriticalSection
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
WideCharToMultiByte
RaiseException
FindResourceExA
LoadResource
LockResource
SizeofResource
FindResourceA
GetLastError
VirtualAlloc
GetSystemInfo
VirtualQuery
GetWindowsDirectoryA
RtlUnwind
user32
FindWindowA
CopyRect
ReleaseDC
GetWindowDC
ScreenToClient
GetSubMenu
LoadMenuA
TrackPopupMenu
EnableMenuItem
ExitWindowsEx
GetDC
GetSystemMetrics
SetFocus
LoadIconA
DestroyMenu
ModifyMenuA
DefWindowProcA
CallWindowProcA
GetSystemMenu
DialogBoxParamA
SetForegroundWindow
InvalidateRect
RedrawWindow
ShowWindow
PostQuitMessage
RemovePropA
SetPropA
GetDlgCtrlID
MessageBoxA
KillTimer
EnableWindow
SetTimer
DestroyWindow
CreateDialogParamA
IsWindow
PostMessageA
GetActiveWindow
SetClipboardData
EmptyClipboard
CloseClipboard
OpenClipboard
GetPropA
MsgWaitForMultipleObjects
GetForegroundWindow
SetWindowLongA
GetWindowLongA
SendMessageA
EndDialog
GetWindow
SystemParametersInfoA
GetWindowRect
GetParent
LoadImageA
DispatchMessageA
TranslateMessage
PeekMessageA
CreateWindowExA
GetClientRect
MapWindowPoints
SetWindowPos
GetDlgItem
wvsprintfA
IsWindowVisible
GetDesktopWindow
CharNextA
UnregisterClassA
SetWindowTextA
LoadStringA
gdi32
GetObjectA
CreateFontIndirectA
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
GetWindowExtEx
GetViewportExtEx
SetMapMode
GetMapMode
GetDeviceCaps
DeleteObject
GetStockObject
DeleteDC
SetBkMode
advapi32
LookupPrivilegeValueA
OpenProcessToken
CloseServiceHandle
RegQueryInfoKeyA
RegDeleteKeyA
StartServiceA
QueryServiceStatus
OpenServiceA
RegDeleteValueA
GetUserNameA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
UnlockServiceDatabase
RegEnumKeyExA
OpenSCManagerA
LockServiceDatabase
AdjustTokenPrivileges
shell32
SHBrowseForFolderA
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
ole32
CoTaskMemFree
CoCreateInstance
CreateStreamOnHGlobal
CoTaskMemRealloc
CoTaskMemAlloc
CoInitialize
CoUninitialize
oleaut32
VarUI4FromStr
OleLoadPicture
comctl32
PropertySheetA
CreatePropertySheetPageA
DestroyPropertySheetPage
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ