Static task
static1
Behavioral task
behavioral1
Sample
d4292694d8b0ccfdb0cb4f2a0d6c06cd_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d4292694d8b0ccfdb0cb4f2a0d6c06cd_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d4292694d8b0ccfdb0cb4f2a0d6c06cd_JaffaCakes118
-
Size
111KB
-
MD5
d4292694d8b0ccfdb0cb4f2a0d6c06cd
-
SHA1
6e6dfc15d97dc0a512a9d036a3f462a8d672b8a1
-
SHA256
c6f0d350cbff3942b4fbff5897fb087f3839faca81e0b7bdfa0a0926ffe7ed06
-
SHA512
63cb376fa23220fb4b01bce643bf9d1770cd044618739cb3923b2de9dfdef5fe07cedeb608d69061369d432ce8b4abb6a13ae35b8dc4d11f312722793b299ad4
-
SSDEEP
1536:k1QdnCvcuzHBomrrKuGtO6kK8Vt4865txur0uW+u9FSi6ZUWpCxJXjJX4TZ0Sk:kHzhmvO6H8Vp65txA02u9UicC7XuKv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4292694d8b0ccfdb0cb4f2a0d6c06cd_JaffaCakes118
Files
-
d4292694d8b0ccfdb0cb4f2a0d6c06cd_JaffaCakes118.exe windows:5 windows x86 arch:x86
bf61964beed808146c557dccf7aed64f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
GetUserNameW
RegCloseKey
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
RegOpenKeyExA
RegQueryValueExA
RegQueryValueExW
RegSetValueExA
RegSetValueExW
msvcrt
free
_CxxThrowException
_XcptFilter
__CxxFrameHandler
__dllonexit
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
wcsncmp
wcslen
strlen
srand
rand
memset
memmove
memcpy
_acmdln
malloc
memcmp
exit
_wcsicmp
_purecall
_onexit
_initterm
_exit
_except_handler3
_controlfp
_beginthreadex
_adjust_fdiv
ole32
CoInitialize
CoTaskMemAlloc
CoTaskMemFree
CoUninitialize
DoDragDrop
OleInitialize
OleUninitialize
RegisterDragDrop
ReleaseStgMedium
RevokeDragDrop
comdlg32
PrintDlgA
PageSetupDlgA
GetFileTitleA
shell32
SHBrowseForFolderA
SHFileOperationA
SHGetDesktopFolder
SHGetFileInfoA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SheChangeDirA
ShellExecuteA
SHChangeNotify
user32
GetWindowTextA
GetWindowTextW
InsertMenuItemA
InvalidateRect
IsDlgButtonChecked
IsWindowEnabled
IsZoomed
KillTimer
LoadAcceleratorsA
LoadAcceleratorsW
LoadBitmapA
LoadCursorA
GetGUIThreadInfo
LockSetForegroundWindow
LookupIconIdFromDirectory
MapDialogRect
MapVirtualKeyA
MessageBoxW
ModifyMenuW
NotifyWinEvent
OpenClipboard
PostMessageA
PostQuitMessage
RegisterClassA
RemoveMenu
SendMessageW
SetDebugErrorLevel
SetMenu
SetMenuItemInfoW
SetTimer
SetWindowLongA
SetWindowLongW
SetWindowTextW
ShowScrollBar
ShowWindow
TileWindows
TrackPopupMenuEx
TranslateAcceleratorA
TranslateAcceleratorW
TranslateMDISysAccel
TranslateMessage
GetWindowPlacement
UpdateLayeredWindow
UpdateWindow
wsprintfA
GetDlgItem
GetClientRect
GetClassInfoW
GetClassInfoA
GetCapture
FlashWindowEx
FindWindowA
ExcludeUpdateRgn
EndPaint
EnableWindow
EmptyClipboard
DrawStateW
DrawMenuBar
DispatchMessageW
DestroyWindow
DestroyMenu
DestroyIcon
DestroyAcceleratorTable
DefWindowProcA
DdeGetLastError
DdeConnectList
CreateWindowExW
CreateWindowExA
CreateMenu
CreateIconIndirect
CreateAcceleratorTableA
ChildWindowFromPointEx
CheckRadioButton
CheckMenuRadioItem
CheckMenuItem
CheckDlgButton
CharUpperW
CharUpperA
CharPrevA
CharLowerW
CharLowerA
CallWindowProcA
GetWindowLongA
GetUserObjectInformationA
GetTitleBarInfo
GetSubMenu
GetMenuItemInfoW
GetMenuItemInfoA
GetMenuItemCount
GetMenu
GetKeyState
UnregisterHotKey
GetInputState
LoadIconA
kernel32
lstrcatA
WideCharToMultiByte
WaitForSingleObject
WaitForMultipleObjects
VirtualProtect
VirtualFree
VirtualAlloc
UnmapViewOfFile
SystemTimeToFileTime
SetPriorityClass
SetLastError
SetFileTime
SetFilePointer
SetEvent
SetEndOfFile
RemoveDirectoryW
RemoveDirectoryA
ReadFile
MultiByteToWideChar
MoveFileW
MoveFileA
MapViewOfFile
LocalFree
LoadLibraryW
LoadLibraryA
LeaveCriticalSection
InterlockedIncrement
InitializeCriticalSection
HeapAlloc
GlobalUnlock
GlobalSize
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryW
GetWindowsDirectoryA
GetVolumeInformationW
GetVolumeInformationA
GetVersionExA
GetUserDefaultLangID
GetTickCount
GetTempPathW
GetTempFileNameW
GetTempFileNameA
GetSystemTime
GetStartupInfoA
GetProcessHeap
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetModuleFileNameA
GetLogicalDriveStringsW
GetLogicalDriveStringsA
GetLastError
GetFullPathNameW
GetFullPathNameA
GetFileSize
GetExitCodeThread
GetDriveTypeA
GetDiskFreeSpaceA
GetCurrentProcess
GetCurrentDirectoryW
GetCompressedFileSizeW
FreeLibrary
FormatMessageW
FormatMessageA
FindNextFileW
FindNextFileA
FindNextChangeNotification
FindFirstFileW
FindFirstFileA
FindFirstChangeNotificationW
FindFirstChangeNotificationA
FindCloseChangeNotification
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExitThread
ExitProcess
EnterCriticalSection
DeviceIoControl
DeleteFileW
DeleteFileA
DeleteCriticalSection
CreateProcessW
CreateProcessA
CreateFileW
CreateFileMappingA
CreateFileA
CreateDirectoryW
CreateDirectoryA
CopyFileW
CopyFileA
CompareFileTime
Sections
.text Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ