Static task
static1
Behavioral task
behavioral1
Sample
d34022fa12fafdf5f3ee1de38c1a8fc9_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d34022fa12fafdf5f3ee1de38c1a8fc9_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d34022fa12fafdf5f3ee1de38c1a8fc9_JaffaCakes118
-
Size
222KB
-
MD5
d34022fa12fafdf5f3ee1de38c1a8fc9
-
SHA1
c8ace58cba3ca3f08e24886f2a39717fab6da860
-
SHA256
e788e023bdd22a350605a8ec82cd2f1169097826ce2b49f7c7beb4c14b8fa840
-
SHA512
e52350c9b5f3c220e6f3dac7236d94d514857d2e0d51a0f852f28d7a634c082250f62f4a7616ff44dfbc1c53ead4fc13d1507bb70e863dad36f64c5ea6b4770a
-
SSDEEP
3072:4OzYCftAaMs/FSnQUVIIJSa3eWzPTq4aA5HWEUada+g:RzYBB/aiWEF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d34022fa12fafdf5f3ee1de38c1a8fc9_JaffaCakes118
Files
-
d34022fa12fafdf5f3ee1de38c1a8fc9_JaffaCakes118.exe windows:5 windows x86 arch:x86
3bfe2fedb338bddc525c73e96fba3235
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrToIntA
wnsprintfA
StrStrA
StrStrIA
StrNCatA
kernel32
GetComputerNameA
GetVolumeInformationA
MoveFileExA
GetCurrentProcess
Process32First
GetTickCount
GetWindowsDirectoryA
Sleep
CreateProcessA
FindFirstFileA
RemoveDirectoryA
FindClose
GetPrivateProfileStringA
Process32Next
GetModuleFileNameA
FindNextFileA
CreateToolhelp32Snapshot
GetVersionExA
GetTempPathA
DeleteFileA
CloseHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetLocaleInfoA
HeapSize
FlushFileBuffers
RtlUnwind
GetSystemTimeAsFileTime
GetCurrentProcessId
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetEndOfFile
SetFilePointer
SetStdHandle
IsValidCodePage
GetOEMCP
GetACP
lstrcmpiA
GetLastError
ReadFile
WriteFile
GetProcessHeap
HeapFree
HeapAlloc
GetFileSize
CreateFileA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleHandleA
lstrcatA
lstrcpynA
lstrlenA
RaiseException
GetCPInfo
InitializeCriticalSectionAndSpinCount
HeapReAlloc
EnterCriticalSection
LeaveCriticalSection
GetModuleHandleW
ExitProcess
GetFileType
MultiByteToWideChar
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
DeleteCriticalSection
VirtualAlloc
SetHandleCount
GetStdHandle
user32
PostQuitMessage
SendDlgItemMessageA
FillRect
LoadBitmapA
LoadIconA
GetClientRect
ExitWindowsEx
SendMessageA
BeginPaint
IsDialogMessageA
RegisterClassExA
GetWindowLongA
CreateWindowExA
GetDlgItem
DefWindowProcA
SetWindowPos
ShowWindow
IsWindow
DispatchMessageA
AdjustWindowRectEx
SetWindowTextA
UpdateWindow
FindWindowA
LoadCursorA
GetWindowRect
GetMessageA
DestroyWindow
EndPaint
TranslateMessage
gdi32
BitBlt
GetTextExtentPoint32A
SetTextColor
DeleteDC
CreateFontA
SetBkMode
SelectObject
CreateCompatibleDC
GetObjectA
GetStockObject
CreateSolidBrush
TextOutA
advapi32
RegDeleteValueA
RegOpenKeyExA
RegDeleteKeyA
RegSetValueExA
RegCloseKey
RegCreateKeyA
RegQueryValueExA
shell32
SHGetFolderPathA
SHFileOperationA
ShellExecuteA
Sections
CODE Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 112KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ