Static task
static1
Behavioral task
behavioral1
Sample
d604e3f9d2b7801914d75054f976cd6c_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d604e3f9d2b7801914d75054f976cd6c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d604e3f9d2b7801914d75054f976cd6c_JaffaCakes118
-
Size
54KB
-
MD5
d604e3f9d2b7801914d75054f976cd6c
-
SHA1
8e12342963df1bf49c0dad845523b80f70abf56c
-
SHA256
6d93ed54660aaa628e1adcc507f9c5da3f92a4c9600c9942847d59afee136e01
-
SHA512
f98dc79f7dbbce46ba1726e150c32398890e1e68dd8d2cdb121b379b5d13a1671ee8a7af2dcebd653fd40341415d6e15afc0106be0023e2d6e0aa9ae42f6b018
-
SSDEEP
1536:GrA92Sv2H6Mlq6N7cyCXX01LNaJqauBXFE:19zv2H6Mlqg7RCQkqauBC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d604e3f9d2b7801914d75054f976cd6c_JaffaCakes118
Files
-
d604e3f9d2b7801914d75054f976cd6c_JaffaCakes118.exe windows:4 windows x86 arch:x86
1d7368c8cd32838ef4217b5b8ecb5ab6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
CommDlgExtendedError
GetOpenFileNameW
lz32
LZClose
kernel32
GetDriveTypeW
GetCurrentDirectoryW
GetCurrentThreadId
SetUnhandledExceptionFilter
CreateThread
GetFileSize
GlobalLock
InitializeCriticalSection
GetLocalTime
GetSystemTime
CancelWaitableTimer
LeaveCriticalSection
lstrcmpiW
LockResource
CloseHandle
GetVolumeInformationW
CreateDirectoryW
CompareStringW
GetLocaleInfoW
GetCurrentActCtx
GetSystemTimeAsFileTime
LocalReAlloc
InterlockedDecrement
FindNextFileW
GetEnvironmentVariableW
GetVersionExW
WideCharToMultiByte
SetEndOfFile
SetFileAttributesW
FindFirstFileW
FindClose
GetDateFormatW
SystemTimeToFileTime
GetTimeFormatW
lstrcpynW
GlobalFree
SetFilePointer
WriteFile
GetLastError
SetFileTime
lstrlenW
OpenProcess
DeleteCriticalSection
GetUserDefaultLCID
ExpandEnvironmentStringsW
GlobalAlloc
SearchPathW
SetWaitableTimer
QueryPerformanceCounter
GetComputerNameExW
GetFileType
DuplicateHandle
FreeLibrary
ActivateActCtx
GetTickCount
CreateFileMappingW
SetErrorMode
UnhandledExceptionFilter
MulDiv
FormatMessageW
DeactivateActCtx
lstrcmpA
GetFileTime
FindResourceW
FileTimeToSystemTime
DeleteFileW
MapViewOfFile
CreateFileW
lstrcmpW
TerminateProcess
LocalFree
ReadFile
CreateWaitableTimerW
Sleep
GetFullPathNameW
GlobalUnlock
SetCurrentDirectoryW
GetComputerNameW
DisableThreadLibraryCalls
GetProcAddress
LocalAlloc
InterlockedIncrement
GetCurrentThread
ReleaseActCtx
GetUserDefaultUILanguage
IsBadWritePtr
EnterCriticalSection
VirtualAlloc
UnmapViewOfFile
LoadResource
GetFileAttributesW
CompareFileTime
LoadLibraryW
GetCurrentProcess
GetCurrentProcessId
ExitThread
IsBadStringPtrW
winmm
auxOutMessage
ole32
OleSetClipboard
OleInitialize
CoTaskMemAlloc
OleUninitialize
CoGetCallContext
CoTaskMemFree
CoCreateInstance
ReleaseStgMedium
OleGetClipboard
comctl32
CreatePropertySheetPageW
ImageList_ReplaceIcon
ImageList_Remove
ImageList_Destroy
DestroyPropertySheetPage
ImageList_Create
ImageList_AddMasked
ImageList_GetIcon
PropertySheetW
ImageList_SetOverlayImage
InitCommonControlsEx
shlwapi
PathFindFileNameW
PathRemoveFileSpecW
PathFindExtensionW
userenv
UnloadUserProfile
ntdsapi
DsMakeSpnW
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
mpr
WNetGetConnectionW
WNetGetNetworkInformationW
WNetGetResourceInformationW
gdi32
BitBlt
GetObjectW
DeleteObject
SelectObject
CreatePalette
CreateDIBitmap
CreateCompatibleDC
RealizePalette
GetDeviceCaps
DeleteDC
SelectPalette
CreateFontIndirectW
GetStockObject
user32
CreateWindowExW
GetSubMenu
GetMenuItemInfoW
ReleaseDC
EndDialog
GetWindowThreadProcessId
GetLastActivePopup
EnumWindows
EnumChildWindows
GetDC
SetWindowPos
MapWindowPoints
SetMenuDefaultItem
RemoveMenu
MessageBeep
LoadCursorW
PostMessageW
SendMessageW
LoadStringW
GetClassNameW
WinHelpW
DefWindowProcW
ShowWindow
GetWindowTextW
FindWindowW
LoadImageW
DestroyWindow
GetMenuItemID
CheckRadioButton
ValidateRect
GetClassInfoW
DestroyMenu
LoadMenuW
GetWindowRect
GetClientRect
SendDlgItemMessageW
SetForegroundWindow
CheckDlgButton
SystemParametersInfoW
EnableMenuItem
SetCursor
GetKeyState
IsDlgButtonChecked
RegisterClipboardFormatW
GetParent
RegisterClassW
TrackPopupMenu
SetDlgItemTextW
InvalidateRect
GetWindowLongW
SetFocus
SetTimer
DialogBoxParamW
CheckMenuItem
GetSystemMetrics
MessageBoxW
KillTimer
IsWindow
GetDlgItemInt
GetMenuItemCount
EnableWindow
GetWindowTextLengthW
SetWindowTextW
GetWindow
SetMenuItemInfoW
DestroyIcon
SwitchToThisWindow
RegisterWindowMessageW
GetDlgItemTextW
GetDlgItem
GetForegroundWindow
SetWindowLongW
msvcrt
_wcsnicmp
wcschr
wcstombs
wcslen
wcsstr
rand
wcsncmp
_adjust_fdiv
wcsncpy
wcscmp
wcsrchr
_itow
wcsspn
malloc
free
wcstoul
setlocale
memmove
_purecall
iswctype
mbstowcs
wcspbrk
_wcsicmp
_except_handler3
_vsnwprintf
_initterm
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
AllocateAndInitializeSid
GetTokenInformation
RegEnumKeyExW
RegOpenKeyExW
RevertToSelf
SetSecurityDescriptorOwner
CheckTokenMembership
LookupPrivilegeValueW
GetFileSecurityW
RegSetValueExW
GetSecurityInfo
FreeSid
QueryServiceStatus
OpenSCManagerW
SetSecurityInfo
OpenServiceW
AccessCheck
OpenProcessToken
ControlService
OpenThreadToken
LookupAccountSidW
RegConnectRegistryW
StartServiceW
RegQueryValueExW
RegCloseKey
ImpersonateSelf
GetUserNameW
RegDeleteKeyW
AdjustTokenPrivileges
CloseServiceHandle
SetEntriesInAclW
secur32
GetUserNameExW
rpcrt4
RpcStringFreeW
RpcBindingSetAuthInfoExW
UuidCreate
RpcBindingFromStringBindingW
RpcBindingFree
RpcStringBindingComposeW
NdrClientCall2
RpcEpResolveBinding
shell32
SHGetFolderPathW
SHFileOperationW
SHExtractIconsW
ShellExecuteW
SHGetPathFromIDListW
DragQueryFileW
SHChangeNotify
Sections
.textbss Size: 43KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 420B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ