Static task
static1
Behavioral task
behavioral1
Sample
dc2faa16c97b081c9cba0601e0a767ef_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dc2faa16c97b081c9cba0601e0a767ef_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dc2faa16c97b081c9cba0601e0a767ef_JaffaCakes118
-
Size
600KB
-
MD5
dc2faa16c97b081c9cba0601e0a767ef
-
SHA1
3add6f9429e39f40710bbd85ca5a211fdc75906d
-
SHA256
d123f33883f188de6577e6205802dc1520723c234b84cc773b6cae481a1c9292
-
SHA512
093cf4f6ad2a07adca9b8f54203c70bbe83b0495e99b121b64c272fcefa2e5e5891f55d339617fbf2d393238326d03fa24a4ea87e7877ac7e33be6ed8c4185c2
-
SSDEEP
12288:LuJSy7R10m9UcQkMEIttvtapyNpunKXjGwZ6Tpgk9w3WHAT+fS9dxxyO:LukGLJU6MBtvgy3t6lgqw3IAqGdxx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dc2faa16c97b081c9cba0601e0a767ef_JaffaCakes118
Files
-
dc2faa16c97b081c9cba0601e0a767ef_JaffaCakes118.exe windows:4 windows x86 arch:x86
80d6d9514f5cf67040f9bd7e0ef7dec1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegOpenKeyA
CryptEnumProvidersW
shell32
SHGetDataFromIDListA
ExtractIconA
gdi32
CreateDCW
SetMapMode
InvertRgn
SetColorSpace
GetLogColorSpaceW
GetObjectW
GetColorAdjustment
DeleteDC
DeleteObject
CreateCompatibleBitmap
FlattenPath
DrawEscape
SelectObject
GetDeviceCaps
comctl32
InitCommonControlsEx
_TrackMouseEvent
CreateStatusWindow
CreateToolbarEx
ImageList_EndDrag
DestroyPropertySheetPage
ImageList_GetDragImage
ImageList_Read
ImageList_Replace
CreateToolbar
ImageList_ReplaceIcon
kernel32
CompareStringW
GetCurrentThread
InitializeCriticalSection
GetCommandLineA
GetUserDefaultLCID
HeapAlloc
QueryPerformanceCounter
GetEnvironmentStrings
TlsAlloc
VirtualQuery
GetModuleFileNameA
GetTimeFormatA
GetComputerNameW
UnhandledExceptionFilter
TlsSetValue
SetStdHandle
GetFileType
LeaveCriticalSection
EnumResourceLanguagesA
FindClose
SetLastError
GetAtomNameA
EnumSystemLocalesA
GetProfileStringA
ExitThread
HeapReAlloc
HeapCreate
IsBadWritePtr
GetCurrentThreadId
GetLocaleInfoW
ReadFile
LoadLibraryA
FindResourceA
VirtualFree
GetCommandLineW
GlobalLock
GetTickCount
EnumResourceLanguagesW
FreeEnvironmentStringsA
GetStartupInfoA
GetProfileIntW
CloseHandle
GetStdHandle
SetHandleCount
GetStringTypeExW
GetThreadContext
VirtualAlloc
GetTimeZoneInformation
GetStartupInfoW
WriteFile
InterlockedExchange
LCMapStringA
SetEnvironmentVariableA
GetACP
EnumSystemCodePagesA
GetCurrentProcess
TlsFree
GetVolumeInformationA
SetFilePointer
VirtualFreeEx
CreateDirectoryA
IsValidLocale
MultiByteToWideChar
GetSystemTimeAsFileTime
GetStringTypeA
GetPrivateProfileStringW
TlsGetValue
FlushFileBuffers
HeapDestroy
FlushViewOfFile
GetEnvironmentStringsA
FreeEnvironmentStringsW
GetLongPathNameA
DebugBreak
lstrcpyn
GetCurrentDirectoryA
GetSystemTimeAdjustment
GetLocaleInfoA
RtlUnwind
TerminateProcess
GetFileTime
OpenMutexA
CreateFileMappingA
GetModuleHandleA
HeapFree
EnumDateFormatsExA
GetSystemInfo
ConnectNamedPipe
GetOEMCP
GetCurrentProcessId
SleepEx
GetDiskFreeSpaceExA
SetConsoleTextAttribute
GetLastError
GetPrivateProfileSectionW
IsValidCodePage
lstrcmpiA
GetMailslotInfo
EnumDateFormatsA
GetDateFormatA
GetStringTypeW
SetThreadContext
ExitProcess
GetCPInfo
GetVersionExA
GetModuleFileNameW
SetConsoleOutputCP
LCMapStringW
SetConsoleScreenBufferSize
GetProcAddress
GetEnvironmentStringsW
CreateMutexA
WideCharToMultiByte
LocalCompact
SetComputerNameA
HeapSize
DeleteCriticalSection
EnterCriticalSection
SystemTimeToTzSpecificLocalTime
GetCompressedFileSizeW
CompareStringA
WaitForSingleObject
VirtualProtect
lstrlenA
comdlg32
ChooseColorW
PrintDlgW
ReplaceTextW
LoadAlterBitmap
user32
DrawIcon
ClientToScreen
CharToOemBuffA
DefFrameProcA
MessageBoxW
CreateWindowExW
GetAltTabInfo
DialogBoxParamA
TrackPopupMenu
InsertMenuItemA
DragDetect
RegisterClassExA
RegisterClassA
ExitWindowsEx
GrayStringA
FindWindowExA
CheckDlgButton
SetMenuItemInfoA
DefWindowProcA
ScrollWindowEx
CharLowerW
AnimateWindow
DestroyWindow
UnregisterClassA
CharPrevW
IsIconic
ShowWindow
GetWindowThreadProcessId
Sections
.text Size: 192KB - Virtual size: 189KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 268KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 108KB - Virtual size: 137KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ