Static task
static1
Behavioral task
behavioral1
Sample
da4046159105211f43e86f81dd7475c5_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
da4046159105211f43e86f81dd7475c5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da4046159105211f43e86f81dd7475c5_JaffaCakes118
-
Size
239KB
-
MD5
da4046159105211f43e86f81dd7475c5
-
SHA1
8d5b7a7156e505d7fba3e5c36ac65517c6a36895
-
SHA256
94abf032e67d0be040c3e01628a478a4c08fe02fa2c9ee5904d3eaf310d9af8b
-
SHA512
6f76be8160f0cd72fbc1afd06b3d6dd7aff8ba509f26468dc511142169d062c813a102f3985fd2a512e651b9e91f9a4c940940cde795ffe5de2250afa93369b0
-
SSDEEP
6144:OryfPT/Bu+5x7PxbJNQn+9upeupnThcUK7Tw:Or1+5ZDW+9TchcUKw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource da4046159105211f43e86f81dd7475c5_JaffaCakes118
Files
-
da4046159105211f43e86f81dd7475c5_JaffaCakes118.exe windows:5 windows x86 arch:x86
e15d31a1382873b0bf89fdea15f598c9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_XcptFilter
malloc
_ultow
_setjmp3
longjmp
_wtoi
_wtol
_vsnprintf
_vsnwprintf
memcpy
memmove
free
_amsg_exit
_initterm
bsearch
_wcsicmp
wcsncmp
_wcsnicmp
memset
user32
SendMessageW
SetWindowPos
SendDlgItemMessageW
LoadStringW
CharNextW
ReleaseDC
GetDC
GetWindowRect
CharPrevW
CharUpperW
GetSystemMetrics
MessageBoxW
MessageBeep
DispatchMessageW
MsgWaitForMultipleObjects
PeekMessageW
ExitWindowsEx
EndDialog
EnableWindow
GetDlgItem
SetWindowTextW
GetDesktopWindow
GetDlgItemTextW
SetDlgItemTextW
DialogBoxParamW
OemToCharA
IsWindow
ShowWindow
DestroyWindow
UpdateWindow
CreateDialogParamW
CharNextA
gdi32
CreateFontIndirectW
GetObjectW
GetStockObject
GetDeviceCaps
DeleteObject
kernel32
GetDiskFreeSpaceW
MulDiv
EnumResourceLanguagesW
MultiByteToWideChar
WideCharToMultiByte
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
RtlUnwind
InterlockedCompareExchange
InterlockedExchange
SetFileTime
GetFileTime
ReadFile
WritePrivateProfileSectionW
GetProfileStringW
lstrcmpiA
GetProcessHeap
HeapAlloc
GetLocalTime
HeapFree
GetFullPathNameW
GetSystemInfo
SearchPathW
GetPrivateProfileIntW
FindFirstFileW
FindNextFileW
FindClose
lstrcmpiW
GetCurrentProcess
GetSystemDirectoryW
MoveFileW
MoveFileExW
CopyFileW
GetPrivateProfileSectionW
CreateProcessW
CreateDirectoryW
SetFileAttributesW
GetVolumeInformationW
CompareStringW
ExpandEnvironmentStringsW
GetShortPathNameW
FormatMessageW
RemoveDirectoryW
CreateFileMappingW
GetUserDefaultUILanguage
SetLastError
UnmapViewOfFile
LoadLibraryExW
FindResourceExW
MapViewOfFile
GetLocaleInfoW
GetSystemDefaultUILanguage
Sleep
MapViewOfFileEx
GetLastError
lstrlenW
GetDriveTypeW
LocalFree
GetEnvironmentVariableW
CloseHandle
WriteFile
CreateFileW
WritePrivateProfileStringW
LockResource
LoadResource
SizeofResource
FindResourceW
GetTempFileNameW
GetWindowsDirectoryW
GetTempPathW
LocalAlloc
lstrlenA
SetFilePointer
GetModuleFileNameW
DeleteFileW
LocalReAlloc
GetVersionExW
DisableThreadLibraryCalls
lstrcmpW
GetPrivateProfileStringW
FreeLibrary
GetFileAttributesW
GetProcAddress
GetFileSize
LoadLibraryW
advapi32
RegFlushKey
RegQueryValueExW
RegCreateKeyExW
RegOpenKeyExW
RegQueryInfoKeyW
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyW
RegUnLoadKeyW
RegLoadKeyW
RegSaveKeyW
RegCloseKey
RegDeleteKeyW
EqualSid
GetTokenInformation
RegDeleteValueW
AllocateAndInitializeSid
FreeSid
RegEnumValueW
RegSetValueW
RegSetValueExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
ole32
OleInitialize
OleUninitialize
CoTaskMemFree
version
GetFileVersionInfoSizeW
GetFileVersionInfoA
VerQueryValueW
setupapi
SetupCloseInfFile
SetupDefaultQueueCallbackW
SetupOpenAppendInfFileW
SetupOpenInfFileW
SetupSetDirectoryIdW
SetupGetLineTextW
SetupFindNextLine
SetupFindFirstLineW
SetupGetStringFieldW
SetupCloseFileQueue
SetupTermDefaultQueueCallback
SetupCommitFileQueueW
SetupInitDefaultQueueCallbackEx
SetupQueueCopyW
SetupOpenFileQueue
SetupInstallFromInfSectionW
shlwapi
StrStrIW
StrChrW
PathAddBackslashW
ord215
ord217
StrRChrW
PathFileExistsW
PathAppendW
PathRemoveFileSpecW
PathBuildRootW
PathCombineW
Sections
.text Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ffff Size: 101KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yyup Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jyup Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gyup Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gyep Size: 512B - Virtual size: 288KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ