Static task
static1
Behavioral task
behavioral1
Sample
d696867b7fda098fe97edacc80a39f90_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
d696867b7fda098fe97edacc80a39f90_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d696867b7fda098fe97edacc80a39f90_JaffaCakes118
-
Size
228KB
-
MD5
d696867b7fda098fe97edacc80a39f90
-
SHA1
8565e15dcbb54e6e06c757d16c3bd6b068c6ee9b
-
SHA256
8c7f694d5ac1faed33b958cded9fbf87c1a12d269d334f8bcae35075fc82dfa5
-
SHA512
bc4dbed2b49dc40fc638cfbff3321197b5945576b8d8684c89037a893a7fee7a1857dd49e164d2468f945b36f389bf729226a05ac79a7bed6b23efb76cdc9508
-
SSDEEP
6144:v+nfU/uPt0HEH1YoUN070yjr4NvOmoWwTA/vm3lo1Uo+VN+:v2U/0tnx8i0lWm8AHtyd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d696867b7fda098fe97edacc80a39f90_JaffaCakes118
Files
-
d696867b7fda098fe97edacc80a39f90_JaffaCakes118.exe windows:4 windows x86 arch:x86
fd8fb61f5b01185cf9ea2cd14a3d7f50
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LocalAlloc
SetFilePointer
EnterCriticalSection
GlobalFree
GlobalAlloc
CompareStringW
FreeEnvironmentStringsW
GetCommandLineW
LockResource
LeaveCriticalSection
Sleep
WaitForSingleObjectEx
SetErrorMode
lstrlenW
GetFileAttributesA
SizeofResource
CompareStringA
GetLocaleInfoW
GetTimeZoneInformation
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InterlockedIncrement
InterlockedDecrement
GetStringTypeW
LCMapStringW
MultiByteToWideChar
GetProcAddress
IsBadWritePtr
HeapReAlloc
VirtualAlloc
HeapAlloc
LoadLibraryA
GetACP
GetCPInfo
FatalAppExitA
InitializeCriticalSection
WriteFile
RtlUnwind
HeapFree
VirtualFree
HeapCreate
GetVersionExA
GetEnvironmentVariableA
GetCurrentThread
GetLastError
TlsGetValue
TlsFree
TlsAlloc
TlsSetValue
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetVersion
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
FileTimeToSystemTime
LoadLibraryExW
FindCloseChangeNotification
SetEnvironmentVariableA
WriteConsoleW
GetSystemTimeAsFileTime
GetCurrentThreadId
SetLastError
SetFilePointerEx
LCMapStringA
InterlockedExchange
GetExitCodeProcess
CreateEventA
GetModuleHandleW
GetLocaleInfoA
CreateFileMappingA
InterlockedCompareExchange
FindFirstFileW
GetConsoleOutputCP
GetSystemInfo
GlobalUnlock
DeleteFileA
ExitProcess
WaitForSingleObject
GetCurrentProcessId
GetConsoleCP
FormatMessageA
GetStringTypeA
FindFirstFileA
HeapDestroy
ReleaseMutex
DeleteFileW
SetStdHandle
SetUnhandledExceptionFilter
GlobalLock
IsValidCodePage
GetVersionExW
CreateEventW
FindNextFileW
FindResourceW
DeleteCriticalSection
CreateProcessW
GetStartupInfoW
lstrlenA
GetOEMCP
VirtualAllocEx
user32
AdjustWindowRectEx
ShowWindowAsync
SetWindowPos
DestroyWindow
SetActiveWindow
ReleaseCapture
DestroyMenu
DestroyIcon
LoadIconA
InflateRect
SendMessageW
PtInRect
GetMenuStringW
SetCapture
CreateWindowExA
ClientToScreen
ReleaseDC
LoadStringW
GetSubMenu
CheckMenuItem
GetClientRect
UnregisterClassA
GetMenuItemCount
RegisterClassW
SetWindowLongW
OffsetRect
MessageBeep
TrackPopupMenu
CreateWindowExW
DrawFocusRect
GetActiveWindow
AllowSetForegroundWindow
SetWindowTextW
GetCursorPos
PostMessageW
MoveWindow
SetMenuItemInfoA
GetMenu
GetKeyState
DefWindowProcW
ole32
OleUninitialize
OleRegGetUserType
OleRun
OleInitialize
CoRevokeClassObject
CoCreateInstance
CoInitializeSecurity
CoDisconnectObject
ReleaseStgMedium
CoQueryProxyBlanket
CLSIDFromProgID
StgCreateDocfileOnILockBytes
CoLockObjectExternal
CoCreateGuid
CoGetClassObject
CoRegisterMessageFilter
GetRunningObjectTable
CoTaskMemAlloc
CoFreeUnusedLibraries
CLSIDFromString
CoTaskMemFree
OleFlushClipboard
CoInitialize
CreateBindCtx
CreateStreamOnHGlobal
CoUninitialize
RegisterDragDrop
CreateILockBytesOnHGlobal
StringFromCLSID
RevokeDragDrop
advapi32
RegSetValueExW
RegCloseKey
DeregisterEventSource
RegQueryValueExA
RevertToSelf
AllocateAndInitializeSid
RegDeleteKeyA
CryptCreateHash
FreeSid
RegDeleteKeyW
OpenProcessToken
CryptAcquireContextA
RegEnumValueW
EqualSid
CryptGenRandom
OpenServiceW
AddAccessAllowedAce
AdjustTokenPrivileges
CryptHashData
RegCreateKeyExW
GetLengthSid
RegOpenKeyExA
QueryServiceStatus
RegEnumKeyExA
RegOpenKeyExW
LookupPrivilegeValueA
RegQueryValueExW
AddAccessAllowedAceEx
InitializeAcl
RegDeleteValueA
GetTokenInformation
RegEnumValueA
RegCreateKeyExA
OpenThreadToken
SetSecurityDescriptorDacl
RegDeleteValueW
RegSetValueExA
InitializeSecurityDescriptor
RegQueryInfoKeyW
CryptAcquireContextW
RegEnumKeyExW
CryptDestroyHash
CryptReleaseContext
CloseServiceHandle
Sections
.text Size: 56KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 144KB - Virtual size: 248KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ