Static task
static1
Behavioral task
behavioral1
Sample
d402204e3e74e7d0b755efbd21c35b46_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d402204e3e74e7d0b755efbd21c35b46_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d402204e3e74e7d0b755efbd21c35b46_JaffaCakes118
-
Size
3.8MB
-
MD5
d402204e3e74e7d0b755efbd21c35b46
-
SHA1
9ad593c7c8f33771423399a8063ef07b0e19d2fc
-
SHA256
b8efb9d92c1004e3e752bb64932ebcda2ab765927e73a7e721c948956e4fb4b1
-
SHA512
19352d3be41defb9d04490d0f9afb209bd2f98860aff4e60f86e9434584f4cc92385875c0fe044f3f55a1232538d38da2458ce7446284ab6120141508fd2a277
-
SSDEEP
98304:quG42RnADYYdbcloAqgUlVYGuoT9STED6I8sDxHYlJW:quLQADYw+ErfHuoTITEDZ5xHGJW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d402204e3e74e7d0b755efbd21c35b46_JaffaCakes118
Files
-
d402204e3e74e7d0b755efbd21c35b46_JaffaCakes118.exe windows:4 windows x86 arch:x86
78a5fe08b38b0189dbf83a02ac6fc991
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TryEnterCriticalSection
GetCommModemStatus
SetProcessAffinityMask
GetOEMCP
GetFullPathNameA
ClearCommBreak
WritePrivateProfileStringA
CreateProcessA
SetSystemTime
SetErrorMode
GetPrivateProfileSectionW
ScrollConsoleScreenBufferA
FlushFileBuffers
ExitProcess
lstrcmpA
GenerateConsoleCtrlEvent
user32
GetMenuDefaultItem
IsCharUpperW
SendNotifyMessageW
MonitorFromWindow
ExcludeUpdateRgn
WaitForInputIdle
DefWindowProcA
SetActiveWindow
CharNextA
GetWindowRgn
EnumDisplaySettingsExW
ClientToScreen
CreateDialogIndirectParamA
VkKeyScanW
SendMessageA
SetWindowTextA
SetCursorPos
GetClipboardData
SetPropA
ScreenToClient
GetParent
EnableMenuItem
LoadStringA
DestroyCaret
DefDlgProcA
GetNextDlgGroupItem
MsgWaitForMultipleObjects
GetMonitorInfoW
LoadStringW
RegisterHotKey
CharPrevW
GetWindowTextLengthW
SendDlgItemMessageA
GetClassInfoExA
SetCursor
IsRectEmpty
CharUpperW
SetForegroundWindow
GetDlgItem
RegisterDeviceNotificationW
CopyRect
DefFrameProcA
SetCapture
ExitWindowsEx
SetWindowPos
TabbedTextOutA
GetUserObjectInformationA
ToAscii
CreateIconIndirect
SetUserObjectSecurity
TrackPopupMenuEx
ToUnicodeEx
ModifyMenuW
CreateIcon
EnumChildWindows
ChildWindowFromPointEx
HideCaret
GetMessagePos
GetWindowLongW
MenuItemFromPoint
MonitorFromPoint
SetParent
gdi32
Ellipse
CreateDIBSection
RectInRegion
ExtTextOutW
CreatePatternBrush
AddFontResourceA
GetCurrentObject
OffsetClipRgn
StartDocA
GetWindowOrgEx
EnumEnhMetaFile
CreateICW
GetLayout
GetTextExtentPoint32A
FillRgn
CreateICA
EndDoc
SetGraphicsMode
GetBitmapBits
GetSystemPaletteEntries
ExtFloodFill
advapi32
DuplicateToken
CryptGenRandom
CryptReleaseContext
PrivilegeCheck
RegQueryValueExA
IsValidAcl
GetPrivateObjectSecurity
GetSecurityDescriptorOwner
RegQueryValueA
CreateServiceA
GetCurrentHwProfileW
OpenEventLogW
AddAccessAllowedAce
RegSetValueA
RegCloseKey
StartServiceCtrlDispatcherW
GetSecurityDescriptorLength
ReadEventLogW
CryptVerifySignatureW
MakeSelfRelativeSD
RegSaveKeyA
CryptSetKeyParam
GetUserNameA
InitiateSystemShutdownA
StartServiceA
LookupPrivilegeValueW
ImpersonateNamedPipeClient
RegSetValueExA
OpenSCManagerW
shell32
DragAcceptFiles
DragFinish
SHGetSettings
FindExecutableW
oleaut32
VariantCopy
QueryPathOfRegTypeLi
shlwapi
wvnsprintfW
StrFormatByteSizeA
StrCpyNW
Sections
.text Size: 13KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ