Static task
static1
Behavioral task
behavioral1
Sample
d1ffed3f340d5a3ed2359cafcc0a8408_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1ffed3f340d5a3ed2359cafcc0a8408_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d1ffed3f340d5a3ed2359cafcc0a8408_JaffaCakes118
-
Size
180KB
-
MD5
d1ffed3f340d5a3ed2359cafcc0a8408
-
SHA1
358a5512b8e3f5a964879cef6ecfe53fe57471e2
-
SHA256
b4a4d5a0e24476c007422505038dddb55d28affd84297b1fddd0a5f4d388688a
-
SHA512
d02bbfd5d42f9814b05f19b6b770a8d4953bfd711d64958e1060685bfc13db57ca6142ad81182ec99f8d2632021b23796dc2548d6391258634d22aa0a686c528
-
SSDEEP
3072:uLdM6TyZ1zqgg8nBnGUh7prYAQarkcHWDQAlAIkFo1awYG:uSoyNg8nB1h7pYOWDQQ3wG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d1ffed3f340d5a3ed2359cafcc0a8408_JaffaCakes118
Files
-
d1ffed3f340d5a3ed2359cafcc0a8408_JaffaCakes118.exe windows:4 windows x86 arch:x86
4e18ece37b73715490edcb0c2f7c8378
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
GetSystemTime
GetLocalTime
ExitProcess
HeapAlloc
HeapFree
CreateThread
ExitThread
RaiseException
TerminateProcess
HeapSize
HeapReAlloc
GetACP
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
RtlUnwind
IsBadReadPtr
IsBadCodePtr
GetVersionExA
SetStdHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetCurrentProcessId
GetFileTime
GetFileSize
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DeleteFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetCurrentProcess
DuplicateHandle
GetOEMCP
GetCPInfo
WritePrivateProfileStringA
GetPrivateProfileStringA
GlobalFlags
GetProcessVersion
LoadLibraryA
FreeLibrary
GetSystemTimeAsFileTime
CreatePipe
CreateProcessA
DeviceIoControl
InterlockedExchange
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GetProcAddress
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
GlobalHandle
GlobalUnlock
GlobalFree
TlsAlloc
LocalAlloc
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetVersion
InitializeCriticalSection
SetLastError
lstrcpynA
lstrcpyA
lstrcatA
SetErrorMode
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpiA
GetCurrentThread
lstrcmpA
CreateEventA
SuspendThread
SetThreadPriority
ResumeThread
SetEvent
WaitForSingleObject
CloseHandle
LocalFree
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GetCommandLineA
GetModuleHandleA
OutputDebugStringA
GetLastError
GetModuleFileNameA
GetCurrentThreadId
Sleep
GetSystemDirectoryA
GetWindowsDirectoryA
GetTempPathA
SetUnhandledExceptionFilter
user32
ClientToScreen
PtInRect
GetClassNameA
SetCursor
GetDC
ReleaseDC
GetSysColorBrush
LoadCursorA
IsWindowEnabled
ShowWindow
SetWindowTextA
LoadIconA
MapWindowPoints
GetSysColor
SetFocus
AdjustWindowRectEx
GetClientRect
PostThreadMessageA
SetWindowsHookExA
GetCursorPos
PeekMessageA
CopyRect
EnableWindow
DrawTextA
GetTopWindow
MessageBoxA
GetCapture
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GrayStringA
DestroyMenu
CharUpperA
GetMenuItemID
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetDlgItem
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
DestroyWindow
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
SetForegroundWindow
GetWindow
GetWindowLongA
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
SendMessageA
GetActiveWindow
DispatchMessageA
TranslateMessage
GetMessageA
PostQuitMessage
PostMessageA
UnhookWindowsHookEx
LoadStringA
GetNextDlgTabItem
GetParent
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetSystemMetrics
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
TabbedTextOutA
gdi32
TextOutA
ExtTextOutA
Escape
RectVisible
PtVisible
SetMapMode
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
GetObjectA
GetDeviceCaps
DeleteObject
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
advapi32
CloseServiceHandle
RegOpenKeyExA
RegCreateKeyExA
ControlService
StartServiceA
SetServiceStatus
RegisterServiceCtrlHandlerA
StartServiceCtrlDispatcherA
RegisterEventSourceA
ReportEventA
DeleteService
CreateServiceA
RegCreateKeyA
RegSetValueExA
RegCloseKey
OpenSCManagerA
OpenServiceA
DeregisterEventSource
comctl32
ord17
urlmon
URLDownloadToFileA
wininet
DeleteUrlCacheEntry
netapi32
Netbios
oleaut32
SysFreeString
VariantClear
SysAllocString
Sections
.text Size: 128KB - Virtual size: 126KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ