Static task
static1
Behavioral task
behavioral1
Sample
dcd409fa904f30ab580781337fb866b7_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
dcd409fa904f30ab580781337fb866b7_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dcd409fa904f30ab580781337fb866b7_JaffaCakes118
-
Size
550KB
-
MD5
dcd409fa904f30ab580781337fb866b7
-
SHA1
e377b6810bb20b46ec0ce24020a58dfec7f94b18
-
SHA256
2cca553e01de4f4ba2f5eaa1b0b1bc8bfbaee289d7b95dbdb3d6e0d67cd9c7fd
-
SHA512
000686649dc4b9ff86ec29213b09cd28ce405fd28d1886110166d1b82aa1e2f760c9acb3fbc10dd793d986151cb4a75f222fe4bf7e4d83302087e414aa23416a
-
SSDEEP
6144:aQbQA4BEMTpzHq1KZe75Q3QbpkcuxgrLQxPS5LjYQuuXVCCk/j+lTsAJmfDe+Bui:HQDFKFAe7YYsFV4qR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dcd409fa904f30ab580781337fb866b7_JaffaCakes118
Files
-
dcd409fa904f30ab580781337fb866b7_JaffaCakes118.exe windows:4 windows x86 arch:x86
00820213dca84d93f40ffdf514a6b4dc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
setupapi
SetupDiGetDeviceRegistryPropertyA
SetupDiEnumDeviceInfo
SetupDiGetClassDevsA
SetupDiGetDeviceInstanceIdA
SetupDiClassGuidsFromNameA
SetupDiGetINFClassA
SetupDiGetDeviceInstallParamsA
SetupDiCallClassInstaller
SetupDiEnumDriverInfoA
SetupDiBuildDriverInfoList
SetupDiSetDeviceInstallParamsA
SetupDiRegisterDeviceInfo
SetupDiSetDeviceRegistryPropertyA
SetupDiCreateDeviceInfoA
SetupDiCreateDeviceInfoList
SetupDiDestroyDriverInfoList
SetupDiSetSelectedDevice
SetupDiGetDriverInfoDetailA
SetupDiRemoveDevice
SetupDiDestroyDeviceInfoList
comctl32
ord17
shlwapi
PathAppendA
PathUnquoteSpacesA
PathIsDirectoryA
PathIsRelativeA
kernel32
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
FindClose
FindNextFileA
SetLastError
FindFirstFileA
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
Sleep
GetModuleFileNameA
SetCurrentDirectoryA
GetFullPathNameA
DeleteFileA
SetFileAttributesA
GetFileAttributesA
GetVersionExA
GetComputerNameA
GetUserDefaultLangID
GetCurrentDirectoryA
GetWindowsDirectoryA
GetCurrentProcess
ReleaseMutex
CreateDirectoryA
MapViewOfFile
CreateFileMappingA
CreateMutexA
UnmapViewOfFile
GetTimeFormatA
GetLocalTime
OutputDebugStringA
lstrcpynA
MoveFileExA
LocalAlloc
GetCurrentThread
FreeLibrary
SetEnvironmentVariableA
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
GetLastError
OpenProcess
MultiByteToWideChar
DeviceIoControl
CreateFileA
CloseHandle
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
CopyFileA
GetCurrentProcessId
GetCurrentThreadId
RemoveDirectoryA
WriteFile
SetFilePointer
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
LeaveCriticalSection
EnterCriticalSection
RaiseException
LCMapStringW
WideCharToMultiByte
LCMapStringA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
ReadFile
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetStartupInfoA
GetProcessHeap
HeapAlloc
FormatMessageA
LocalFree
LoadLibraryA
InitializeCriticalSection
GetConsoleCP
GetConsoleMode
GetPrivateProfileStringA
WinExec
FlushFileBuffers
GetSystemTimeAsFileTime
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
TerminateProcess
GetCommandLineA
RtlUnwind
HeapFree
CompareStringW
CompareStringA
SetEndOfFile
SetStdHandle
ExitProcess
user32
EndDeferWindowPos
MessageBoxA
LoadStringA
LoadImageA
BeginDeferWindowPos
GetWindowRect
UpdateWindow
ShowWindow
GetClientRect
GetSystemMetrics
SendMessageA
OffsetRect
CopyRect
GetParent
CheckDlgButton
SetDlgItemTextA
GetDlgItem
EnableWindow
IsDlgButtonChecked
LoadBitmapA
GetWindowThreadProcessId
EnumWindows
DialogBoxParamA
GetWindowInfo
ExitWindowsEx
CreateWindowExA
SetWindowPos
GetDesktopWindow
DeferWindowPos
EndDialog
advapi32
OpenSCManagerA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
CloseServiceHandle
ImpersonateSelf
OpenThreadToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
RegDeleteValueA
RegEnumValueA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegSetValueExA
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
SHGetFolderPathA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CoSetProxyBlanket
oleaut32
SysStringLen
SysAllocStringLen
SysFreeString
Sections
.text Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 312KB - Virtual size: 310KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ardata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE