Static task
static1
Behavioral task
behavioral1
Sample
dcfc80d7c6b34b66dff71e263abd7750_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dcfc80d7c6b34b66dff71e263abd7750_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
dcfc80d7c6b34b66dff71e263abd7750_JaffaCakes118
-
Size
623KB
-
MD5
dcfc80d7c6b34b66dff71e263abd7750
-
SHA1
4e792ed8bb14f3f7b46c2d289cfbd7a948f9f3e4
-
SHA256
8b99a1a57ae2b46d485d0be5face9288ac33f517564930a934b394fc04acd59e
-
SHA512
f60eceacc04aebff335a19cedbb455d5f70dd03257ce54ffa8eb829df506d0f2e7d79d867fbe81f7802e6b3d5dcb5d47a4f834bd1e3de64948e4e1e7f530d91b
-
SSDEEP
12288:I8qSa/9F2HL6lcdzozISAsS2fhpf0n7WH:ICa/aOcd5SAsSkj87W
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dcfc80d7c6b34b66dff71e263abd7750_JaffaCakes118
Files
-
dcfc80d7c6b34b66dff71e263abd7750_JaffaCakes118.exe windows:4 windows x86 arch:x86
5e1a5f44d12f8ee28338dd89c3bbd9dc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DPtoLP
PolyTextOutW
CreateHalftonePalette
GetWindowExtEx
WidenPath
CreateDIBPatternBrushPt
GetMetaFileBitsEx
CreatePalette
SetDIBitsToDevice
GetViewportExtEx
GetGlyphOutline
EnumFontFamiliesExW
DeleteObject
GetPaletteEntries
GetICMProfileW
GetBkMode
GetPixelFormat
SetPixelV
gdiPlaySpoolStream
CreateRectRgnIndirect
GetRasterizerCaps
shell32
ShellHookProc
SHAddToRecentDocs
kernel32
TlsFree
SetHandleCount
RtlUnwind
GetDriveTypeW
HeapReAlloc
GetOEMCP
LoadLibraryA
GetVersionExA
LeaveCriticalSection
GetEnvironmentStrings
LCMapStringW
GetStartupInfoA
VirtualQuery
GetTimeZoneInformation
InitializeCriticalSection
GetCurrentProcessId
GetTimeFormatA
MultiByteToWideChar
GetCurrentThreadId
InterlockedExchange
SetFilePointer
CloseHandle
EnterCriticalSection
GetCurrentDirectoryW
HeapCreate
CompareStringW
FreeEnvironmentStringsW
VirtualProtect
CreateProcessA
GetThreadTimes
HeapFree
GetSystemTimeAsFileTime
CreateMutexA
ReadFile
DeleteCriticalSection
IsBadWritePtr
HeapAlloc
lstrcpy
GetProcessAffinityMask
GetSystemInfo
SetStdHandle
SetConsoleTextAttribute
TlsSetValue
CommConfigDialogA
TlsGetValue
FindAtomA
WriteFile
GetStdHandle
GetStringTypeW
GetDateFormatA
VirtualAlloc
FlushFileBuffers
GetCurrencyFormatW
WideCharToMultiByte
SetEnvironmentVariableA
GetTickCount
UnmapViewOfFile
FreeEnvironmentStringsA
HeapDestroy
GetEnvironmentStringsW
VirtualFree
QueryPerformanceCounter
GetCurrentThread
SetLastError
GetACP
DeleteFiber
GetModuleHandleA
GetProcAddress
GetCPInfo
GetLocaleInfoW
UnhandledExceptionFilter
GetUserDefaultLCID
GetDiskFreeSpaceExA
GetModuleFileNameA
HeapSize
GetLocaleInfoA
LCMapStringA
TerminateProcess
GetLastError
GetFileType
GetVolumeInformationW
IsValidLocale
SetLocaleInfoW
ExitProcess
EnumSystemLocalesA
OpenSemaphoreA
TlsAlloc
SetFileAttributesA
CompareStringA
GetStringTypeA
OpenMutexA
IsValidCodePage
GetCommandLineA
GetCurrentProcess
user32
DrawTextExA
KillTimer
SetMenuContextHelpId
RealGetWindowClass
LoadImageW
SetDlgItemInt
MapVirtualKeyExA
RegisterClassA
PaintDesktop
UnregisterDeviceNotification
ImpersonateDdeClientWindow
SetPropA
PackDDElParam
CreateWindowStationW
RegisterClassExA
OemToCharBuffW
ValidateRgn
SwitchDesktop
CreateWindowExW
SetWindowWord
comctl32
InitCommonControlsEx
comdlg32
PrintDlgA
ChooseFontA
ChooseColorW
advapi32
LookupPrivilegeNameA
RegFlushKey
LookupPrivilegeDisplayNameW
RegRestoreKeyA
RegRestoreKeyW
CryptVerifySignatureW
RegCreateKeyW
RegReplaceKeyA
RegCreateKeyExW
LookupPrivilegeValueA
AbortSystemShutdownW
DuplicateTokenEx
RegConnectRegistryW
CryptSetProviderExW
RegCreateKeyA
CryptSetProviderW
RegLoadKeyW
RegOpenKeyA
Sections
.text Size: 289KB - Virtual size: 289KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 319KB - Virtual size: 319KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ