Static task
static1
Behavioral task
behavioral1
Sample
dfbce5a8048a1645244a1558480951f5_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dfbce5a8048a1645244a1558480951f5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dfbce5a8048a1645244a1558480951f5_JaffaCakes118
-
Size
111KB
-
MD5
dfbce5a8048a1645244a1558480951f5
-
SHA1
d2766709af450a32590377a92265304c28ab8319
-
SHA256
fcc6c326ba864856a4489ca4133eddfa43a0e60d91acbc0dfe68dd651560dc5f
-
SHA512
81d2ce8caf9c07006ff3d516f9d0a9ebce40c89d8252e93a99db95bd9ba07d9ce1e4516ae55809e913c8a3f731531841446c3726a9c6cda5192735125c7ac3c5
-
SSDEEP
3072:9std5vQR+gyYlUUzMHJso0JFIxnOdjF8NIbcF+:9sJc+5FUjTIpOr3AE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dfbce5a8048a1645244a1558480951f5_JaffaCakes118
Files
-
dfbce5a8048a1645244a1558480951f5_JaffaCakes118.exe windows:4 windows x86 arch:x86
364623147f3d0e8e947efd28eafa048e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerInstallFileA
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
gdi32
GetTextMetricsA
CreateFontIndirectA
SelectObject
GetStockObject
DeleteObject
GetDeviceCaps
SetTextColor
advapi32
RegOpenKeyA
RegQueryInfoKeyA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegEnumKeyExA
RegCloseKey
RegSetValueExA
RegCreateKeyA
user32
CharNextA
GetWindowLongA
ExitWindowsEx
UpdateWindow
MessageBeep
PeekMessageA
DestroyWindow
DefWindowProcA
CharUpperA
CharPrevA
GetClientRect
PostQuitMessage
BeginPaint
EndPaint
OffsetRect
DrawTextA
IsWindow
SendMessageA
FindWindowA
GetDC
ShowCursor
CreateWindowExA
ReleaseDC
GetSystemMetrics
MoveWindow
DispatchMessageA
ShowWindow
TranslateMessage
SetFocus
GetMessageA
BringWindowToTop
LoadCursorA
wvsprintfA
MessageBoxA
wsprintfA
LoadIconA
RegisterClassA
LoadStringA
PostMessageA
PackDDElParam
UnregisterClassA
UnpackDDElParam
kernel32
_lread
FreeLibrary
GetExitCodeProcess
GetLastError
Sleep
CompareStringA
GlobalDeleteAtom
GetFullPathNameA
GlobalFindAtomA
GetFileAttributesA
GlobalAddAtomA
HeapReAlloc
GetStringTypeW
GetStringTypeA
CompareStringW
LCMapStringA
HeapFree
LCMapStringW
HeapCreate
GetStdHandle
SetHandleCount
GetOEMCP
GetFileType
GetCPInfo
WideCharToMultiByte
GetACP
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
MultiByteToWideChar
HeapAlloc
TerminateProcess
RtlUnwind
GetVersion
GetCommandLineA
ExitProcess
CreateDirectoryA
SetCurrentDirectoryA
LocalFree
LocalUnlock
lstrcpyA
LocalLock
LocalAlloc
lstrcatA
lstrcpynA
lstrcmpiA
lstrlenA
CloseHandle
CreateFileA
GetTempFileNameA
GetTempPathA
GetPrivateProfileStringA
IsDBCSLeadByte
GetFileSize
GlobalFree
GlobalUnlock
_lclose
_lwrite
GetModuleFileNameA
GlobalLock
GlobalAlloc
OpenFile
FindClose
FindFirstFileA
GetVersionExA
GetStartupInfoA
GetShortPathNameA
GetCurrentDirectoryA
CreateProcessA
SetEnvironmentVariableA
GetProcAddress
LoadLibraryA
SetErrorMode
GetDriveTypeA
GetModuleHandleA
DeleteFileA
GetSystemDirectoryA
GetWindowsDirectoryA
GetLocalTime
ReadFile
MoveFileExA
MoveFileA
WriteFile
GetTimeZoneInformation
SetFilePointer
GetCurrentProcess
GetSystemTime
ole32
CoCreateInstance
OleInitialize
OleUninitialize
oleaut32
RegisterTypeLi
LoadTypeLi
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE