Static task
static1
Behavioral task
behavioral1
Sample
df3c1c4de4cd4c83bf5266ce777dc1d4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
df3c1c4de4cd4c83bf5266ce777dc1d4_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
df3c1c4de4cd4c83bf5266ce777dc1d4_JaffaCakes118
-
Size
276KB
-
MD5
df3c1c4de4cd4c83bf5266ce777dc1d4
-
SHA1
c7ca6cc804521bb50cfb5ea0c723dcb8f477e6fb
-
SHA256
5cca5edfafcb57a23bf86f2923f1293fbdadfc65bc03d3de5020529e0fe274c3
-
SHA512
986fa87b85ed546a896d58bf44b6bcffa47b72bd282579df30173fa7f7b6fe2f98eb3501e4b19bece142bb17f2d9bc5591eb645a13457e0d29ccb252e40972db
-
SSDEEP
6144:coCNegYSqk2dJusW0odtdDncT6SwPg4gCaRw6yxsO2ibKkM26ZrTO/W5:Hm56Jup0avynGbgCek20r6ZrTO/W5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource df3c1c4de4cd4c83bf5266ce777dc1d4_JaffaCakes118
Files
-
df3c1c4de4cd4c83bf5266ce777dc1d4_JaffaCakes118.exe windows:4 windows x86 arch:x86
3b47449fc403291c15a0ca10a89a57d9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatA
QueryDosDeviceW
GetTempPathW
CancelIo
FormatMessageW
CreatePipe
FatalAppExitA
WriteProcessMemory
DuplicateHandle
WritePrivateProfileStringW
WritePrivateProfileStructA
GetACP
DeleteCriticalSection
_llseek
GetFileType
VirtualUnlock
CreateIoCompletionPort
GetCPInfo
RemoveDirectoryA
IsDBCSLeadByteEx
SetCommTimeouts
SetConsoleCursorPosition
GetStartupInfoA
SizeofResource
GetLocaleInfoW
MultiByteToWideChar
SetProcessShutdownParameters
GetTickCount
lstrcmpA
PulseEvent
SetLastError
SwitchToFiber
FreeLibrary
ReadConsoleA
GetFileInformationByHandle
LocalReAlloc
FindNextChangeNotification
EnumResourceNamesW
LeaveCriticalSection
GenerateConsoleCtrlEvent
GetDriveTypeW
PeekNamedPipe
IsBadReadPtr
CreateEventA
GetOEMCP
EnumResourceLanguagesW
LoadLibraryExA
ReleaseSemaphore
PrepareTape
WritePrivateProfileStringA
TryEnterCriticalSection
GlobalAddAtomW
RemoveDirectoryW
GetThreadPriority
GetVersion
GetProfileStringA
WritePrivateProfileSectionA
GetPrivateProfileStringW
SystemTimeToFileTime
GlobalFindAtomA
SetTimeZoneInformation
MoveFileExA
VirtualQuery
SearchPathW
GetAtomNameA
SetEnvironmentVariableA
VirtualAllocEx
GetEnvironmentVariableW
SetEndOfFile
GetFileAttributesA
GetModuleHandleA
lstrlenA
GetComputerNameW
VirtualAlloc
user32
ScreenToClient
IsWindowUnicode
GetDCEx
GetClassInfoW
GetWindowTextA
RemovePropW
CheckMenuRadioItem
SystemParametersInfoW
CharLowerW
GetMenuDefaultItem
GetCursor
AdjustWindowRect
CallWindowProcA
CreateWindowStationW
GetClipboardData
SetUserObjectInformationW
GetDlgItemTextW
WindowFromPoint
GetDesktopWindow
ExcludeUpdateRgn
ShowOwnedPopups
GetScrollRange
SetSysColors
ScrollWindow
SetParent
CreatePopupMenu
DeferWindowPos
SetDlgItemTextW
SetCapture
FlashWindow
LoadIconW
CharUpperBuffW
SetUserObjectSecurity
EnumDisplaySettingsExA
FlashWindowEx
SwapMouseButton
MessageBoxIndirectW
ScrollWindowEx
SendDlgItemMessageA
GetSystemMetrics
InsertMenuItemA
GetMenuItemRect
GetAsyncKeyState
UnregisterHotKey
GetClientRect
SetCursorPos
GetMenuState
IsCharUpperA
GetTopWindow
LoadBitmapA
SetMenuInfo
EnumDisplaySettingsExW
CreateDialogParamA
RegisterWindowMessageA
wsprintfA
BringWindowToTop
EnableMenuItem
CharNextExA
gdi32
GdiComment
SetBitmapDimensionEx
InvertRgn
GetGlyphOutlineA
SetTextColor
GetCharWidthW
CreateCompatibleDC
StrokeAndFillPath
EnumFontsA
comdlg32
ReplaceTextA
PageSetupDlgA
FindTextW
advapi32
RegQueryValueW
CryptEncrypt
ObjectCloseAuditAlarmA
RegConnectRegistryA
RegConnectRegistryW
RegCreateKeyW
SetTokenInformation
OpenSCManagerA
GetFileSecurityW
RegEnumValueW
GetNamedSecurityInfoW
shell32
SHFileOperationW
SHGetSpecialFolderPathA
oleaut32
SafeArrayGetElement
SysStringLen
SafeArrayCreate
SafeArrayPutElement
shlwapi
StrToIntW
UrlCreateFromPathW
msvcrt
_except_handler3
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_controlfp
__set_app_type
Sections
.text Size: 236KB - Virtual size: 233KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE