Static task
static1
Behavioral task
behavioral1
Sample
d7527a074de13d27552e3d2d1666eabc_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
d7527a074de13d27552e3d2d1666eabc_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d7527a074de13d27552e3d2d1666eabc_JaffaCakes118
-
Size
252KB
-
MD5
d7527a074de13d27552e3d2d1666eabc
-
SHA1
2a50b7649d3376676cbfc3a070017c018980d594
-
SHA256
a89fe62bb634937af0ba719baa1a9ceb7d49c6d17309704f188197448574ac33
-
SHA512
d801233209cc14887cb9823854730945885053a6f19e9908aee3b50e45912ab195be08cca5caeda82350ceffc8bb8f372427aa666dab0c9d9ebd23872dfbca79
-
SSDEEP
6144:4W/dXaz/jMnCIip4nWYZRnC7BPAb5K72se0cGu:n/dkjMndO4nWURn4oEJPcG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7527a074de13d27552e3d2d1666eabc_JaffaCakes118
Files
-
d7527a074de13d27552e3d2d1666eabc_JaffaCakes118.exe windows:4 windows x86 arch:x86
821d7be940a1a4a3a47140a209926c42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetVolumeLabelA
SetProcessShutdownParameters
SetEvent
CreateIoCompletionPort
TryEnterCriticalSection
FileTimeToLocalFileTime
GlobalUnlock
CreateFileW
ReleaseSemaphore
GetThreadContext
EnumTimeFormatsW
LoadLibraryExW
lstrcmpiW
SearchPathW
GetConsoleCursorInfo
SetConsoleCursorPosition
GetEnvironmentStringsW
MultiByteToWideChar
CreateProcessA
GetModuleFileNameW
EnumCalendarInfoA
GlobalFindAtomA
ClearCommBreak
CreatePipe
FreeResource
CreateNamedPipeW
WriteConsoleOutputW
GetSystemDirectoryW
IsValidLocale
CreateMutexW
LocalSize
Beep
CreateDirectoryW
FindFirstFileA
LCMapStringA
GetFullPathNameA
OpenFile
SetErrorMode
GetACP
GetOEMCP
WriteProcessMemory
VirtualFree
GetTimeZoneInformation
GetSystemTimeAdjustment
SetStdHandle
GetUserDefaultLangID
SetConsoleActiveScreenBuffer
GetBinaryTypeW
GetNumberFormatW
GetSystemDefaultLangID
LoadResource
OutputDebugStringW
GetFileAttributesA
GetDiskFreeSpaceW
VirtualQuery
PrepareTape
FreeEnvironmentStringsA
GetDiskFreeSpaceExA
SetCurrentDirectoryA
VirtualAlloc
GetEnvironmentVariableW
VirtualProtect
GetVersionExA
GetCommandLineA
GetOverlappedResult
GetLocaleInfoW
GetPrivateProfileSectionW
SetMailslotInfo
PurgeComm
GetCommConfig
SetConsoleWindowInfo
SystemTimeToFileTime
GlobalAddAtomW
SetProcessAffinityMask
GetConsoleMode
DeleteCriticalSection
_lread
VirtualLock
ExpandEnvironmentStringsW
ExitProcess
TlsGetValue
_llseek
GetShortPathNameW
GetDateFormatA
FindFirstFileW
SetConsoleOutputCP
DeleteFiber
IsProcessorFeaturePresent
GetCommModemStatus
CreateDirectoryExA
GetPrivateProfileStringW
VirtualQueryEx
user32
GetDlgItemTextW
CharToOemBuffA
SetCaretBlinkTime
SetClassLongW
OpenIcon
GetSubMenu
CreateCursor
GetCursor
InsertMenuW
RegisterWindowMessageA
CharNextW
CreateIconFromResource
gdi32
PolyBezier
SetLayout
comdlg32
PageSetupDlgW
ReplaceTextW
ChooseColorA
advapi32
RegisterEventSourceW
GetNamedSecurityInfoA
GetLengthSid
RegCreateKeyW
RegSetValueA
LookupAccountSidA
RegUnLoadKeyA
SetServiceObjectSecurity
CryptVerifySignatureA
RegConnectRegistryA
DestroyPrivateObjectSecurity
RevertToSelf
EnumServicesStatusW
DeleteService
CryptAcquireContextA
IsTextUnicode
CreatePrivateObjectSecurity
GetFileSecurityW
CryptDeriveKey
MapGenericMask
EnumDependentServicesW
ChangeServiceConfigW
GetCurrentHwProfileW
SetEntriesInAclA
shell32
SHFileOperationA
SHChangeNotify
SHGetSpecialFolderLocation
ShellExecuteA
SHGetSpecialFolderPathW
ole32
CoMarshalInterThreadInterfaceInStream
ReadFmtUserTypeStg
ReadClassStg
CoReleaseMarshalData
CoGetClassObject
CoCreateInstance
OleSetClipboard
CoFileTimeNow
CreateBindCtx
oleaut32
SafeArrayGetElement
shlwapi
wnsprintfA
StrStrIA
SHRegOpenUSKeyW
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 232KB - Virtual size: 229KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE