Static task
static1
Behavioral task
behavioral1
Sample
d714c4661e8d6749202ab9629e4bc06f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d714c4661e8d6749202ab9629e4bc06f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d714c4661e8d6749202ab9629e4bc06f_JaffaCakes118
-
Size
368KB
-
MD5
d714c4661e8d6749202ab9629e4bc06f
-
SHA1
1ab63d9da94840b41e82ed79d98d1ef593882348
-
SHA256
d0c51405d8f2e932df325d3de26ae7d85b602002e5898d4882a1b61e3d1040e4
-
SHA512
91766dabb632baa05e5f0a7d8c451f45be907863091540533b173570512b70738294f0279db94f9ece9aaf21434158c4620254bf2fc7c95e4c3d7cb17f705727
-
SSDEEP
6144:RyYK5ueJYq5Y53wkdxDm70zL79RMIQZd63fSPjFSg:Ry/UeJAVdxM0PxRhl3fSP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d714c4661e8d6749202ab9629e4bc06f_JaffaCakes118
Files
-
d714c4661e8d6749202ab9629e4bc06f_JaffaCakes118.exe windows:4 windows x86 arch:x86
a24eac880c0d31278065093f6d5ca94b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushConsoleInputBuffer
GetCommModemStatus
ConnectNamedPipe
PeekConsoleInputW
ReleaseSemaphore
GetThreadPriority
GetSystemInfo
EnumCalendarInfoW
GetFileAttributesA
FileTimeToLocalFileTime
GlobalGetAtomNameW
LocalLock
MultiByteToWideChar
GetDiskFreeSpaceW
CreatePipe
LoadLibraryExW
lstrcmpiA
IsBadReadPtr
ReadConsoleInputW
EnumTimeFormatsW
SetHandleCount
GetFileType
GetFileInformationByHandle
SystemTimeToFileTime
GetEnvironmentStringsW
DosDateTimeToFileTime
GetBinaryTypeA
CompareStringA
OpenFile
GetTapeStatus
GetTempFileNameA
VirtualFree
ReadConsoleOutputA
_hread
WritePrivateProfileStringA
CreateDirectoryA
SetThreadLocale
VirtualProtect
GetCommandLineA
GetVersionExA
lstrlenA
FlushFileBuffers
ExitProcess
user32
wsprintfA
GetWindowInfo
MessageBoxW
IsCharUpperA
RegisterClassA
GetMessageW
SendMessageW
ClientToScreen
SetProcessWindowStation
SetRectEmpty
GetMenuItemInfoW
AppendMenuA
GetClipboardViewer
IsCharAlphaW
GetWindowLongA
GetSubMenu
CharLowerBuffA
SetCursor
LoadMenuIndirectA
GetClassLongW
GetProcessWindowStation
DragDetect
InSendMessage
GetClassInfoExA
CallNextHookEx
SetScrollPos
DefFrameProcW
GetWindowTextLengthW
LoadAcceleratorsA
UnregisterClassW
UnhookWindowsHookEx
TranslateMDISysAccel
GetWindowTextW
SetFocus
GetCapture
OpenDesktopW
DestroyCaret
AdjustWindowRectEx
GetTopWindow
LoadImageW
TrackPopupMenuEx
GetMenu
SetClassLongW
CharUpperA
CreateDialogIndirectParamW
SetForegroundWindow
MonitorFromPoint
GetAncestor
LoadImageA
GetNextDlgTabItem
gdi32
PlayMetaFileRecord
advapi32
EqualSid
RegisterServiceCtrlHandlerA
RegUnLoadKeyA
RegEnumKeyW
CreateServiceW
SetThreadToken
CryptEncrypt
RegConnectRegistryA
QueryServiceLockStatusW
ChangeServiceConfigA
MapGenericMask
InitializeSecurityDescriptor
LookupPrivilegeDisplayNameA
LookupPrivilegeValueA
shell32
SHFileOperationW
SHChangeNotify
DragQueryPoint
FindExecutableW
Shell_NotifyIconA
ole32
GetRunningObjectTable
CoTaskMemRealloc
CreateStreamOnHGlobal
OleQueryLinkFromData
OleRegGetMiscStatus
oleaut32
SysStringLen
SetErrorInfo
SysFreeString
SafeArrayRedim
LoadTypeLi
SafeArrayCreate
comctl32
ImageList_Duplicate
ImageList_Replace
ImageList_SetBkColor
shlwapi
UrlApplySchemeW
StrDupW
StrCmpNW
StrTrimW
PathCommonPrefixW
UrlIsW
PathFindFileNameW
StrStrIA
UrlCreateFromPathW
PathCompactPathExW
PathIsDirectoryW
SHCopyKeyW
PathAddBackslashA
SHStrDupW
SHEnumValueW
setupapi
SetupDiSetSelectedDriverA
SetupDiGetClassDescriptionExA
SetupDiGetClassDevsExA
SetupGetStringFieldW
SetupDiSetDeviceInstallParamsW
SetupDiGetDeviceRegistryPropertyA
SetupFindNextLine
SetupDiOpenDeviceInterfaceW
SetupPromptReboot
SetupOpenLog
SetupDiEnumDeviceInterfaces
Sections
scwewk Size: 304KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
iimeqaq Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
uikimw Size: 40KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uecis Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ