Static task
static1
Behavioral task
behavioral1
Sample
ddc8c6bfca5f5c829a21f8f313e23a47_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ddc8c6bfca5f5c829a21f8f313e23a47_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ddc8c6bfca5f5c829a21f8f313e23a47_JaffaCakes118
-
Size
96KB
-
MD5
ddc8c6bfca5f5c829a21f8f313e23a47
-
SHA1
7d18f0fccd1377c5c524a1967e2a854e99b8a5ec
-
SHA256
ba7f1a5beec90cbf6d7e595655de8db689c09d258306b4f8bb90653c4c622f89
-
SHA512
c319d9df21f8d92f2b783e2beecbfd29be57f482bf66ddf9c858601a834ad12d01e74589828794181e0bc62cc037920e8f1d419f15466363dc48d5659175b424
-
SSDEEP
1536:y1BRQnHJ51D1p7wi16a2s6vh6u3bpMg1OKQe9V+HQmcYmfzj9zgx6:yyDpEi16L33bZYzU5K6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ddc8c6bfca5f5c829a21f8f313e23a47_JaffaCakes118
Files
-
ddc8c6bfca5f5c829a21f8f313e23a47_JaffaCakes118.exe windows:0 windows x86 arch:x86
6d61f80f0ddc6034b98441876ff3689b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
__set_app_type
_controlfp
_initterm
__getmainargs
_acmdln
exit
_cexit
__setusermatherr
_XcptFilter
_exit
_c_exit
wcscpy
_wcsicmp
free
malloc
advapi32
RegOpenKeyExA
RegQueryValueExA
InitializeSecurityDescriptor
SetSecurityDescriptorOwner
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
RegCreateKeyExW
RegQueryValueExW
RegSetValueExW
RegCloseKey
AllocateAndInitializeSid
FreeSid
OpenThreadToken
OpenProcessToken
GetTokenInformation
CheckTokenMembership
kernel32
lstrlenW
GetSystemWindowsDirectoryW
LocalFree
LocalAlloc
GetCurrentProcess
GetLastError
GetCurrentThread
CloseHandle
lstrcmpiW
WaitForMultipleObjects
OpenEventW
CreateEventW
SetEvent
CreateMutexW
SetLastError
GetCommandLineW
GetWindowsDirectoryW
lstrcmpW
ExitProcess
GetVersionExW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetModuleHandleA
GetStartupInfoA
lstrcatW
GetNumberFormatW
lstrcpyW
VirtualAlloc
GetCurrentThreadId
gdi32
CreateFontIndirectW
CreatePenIndirect
SetTextColor
BitBlt
SetBkColor
CreateSolidBrush
CreateCompatibleDC
SetMapMode
TextOutW
GetTextMetricsW
SetBkMode
RealizePalette
SelectPalette
GetObjectW
StretchBlt
CreateBitmap
DeleteDC
CreateRoundRectRgn
SelectObject
Polyline
DeleteObject
user32
FindWindowW
MapVirtualKeyW
GetAsyncKeyState
SetTimer
SendMessageW
EndDialog
LoadStringW
EnableWindow
MessageBoxW
DialogBoxParamW
IsWindow
GetKeyboardLayout
GetWindowThreadProcessId
wsprintfW
CheckDlgButton
GetClientRect
DestroyWindow
InvalidateRect
WinHelpW
GetKeyboardType
SetClassLongW
RegisterClassW
LoadCursorW
CreateWindowExW
GetSystemMetrics
SetWindowPos
SetWindowLongW
GetKeyState
wsprintfA
DrawIconEx
LoadImageW
SetWindowRgn
ToUnicodeEx
LoadIconW
GetWindowLongW
GetSysColor
ReleaseDC
GetDC
MapVirtualKeyExW
CloseDesktop
GetUserObjectInformationW
OpenDesktopW
OpenInputDesktop
PostMessageW
SetThreadDesktop
GetThreadDesktop
EndPaint
BeginPaint
DefWindowProcW
SetProcessWindowStation
OpenWindowStationW
GetProcessWindowStation
CloseWindowStation
MoveWindow
GetDesktopWindow
GetWindowRect
AllowSetForegroundWindow
SetForegroundWindow
GetForegroundWindow
ShowWindow
IsIconic
DispatchMessageW
TranslateMessage
GetMessageW
UpdateWindow
RegisterWindowMessageW
KillTimer
EnableMenuItem
CheckMenuRadioItem
CheckMenuItem
ReleaseCapture
SetCapture
SetCursor
ChildWindowFromPointEx
ScreenToClient
GetCursorPos
PostQuitMessage
SendInput
ActivateKeyboardLayout
comdlg32
ChooseFontW
winmm
PlaySoundW
mixerSetControlDetails
waveOutGetPitch
joyGetPosEx
midiInAddBuffer
midiOutGetErrorTextA
midiInGetErrorTextA
mixerOpen
midiStreamClose
midiStreamOut
mixerClose
mmioSetInfo
mmioStringToFOURCCA
waveInPrepareHeader
mmioClose
tid32Message
shell32
ShellExecuteW
ole32
CoUninitialize
CoInitialize
Sections
.text Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.PXk Size: 1KB - Virtual size: 16KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gUbqk Size: 2KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 831KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.g Size: 3KB - Virtual size: 22KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pJ Size: 1KB - Virtual size: 42KB
IMAGE_SCN_MEM_READ
.rsrc Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ