Static task
static1
Behavioral task
behavioral1
Sample
e06c61f86144f754fdcb43db2cd56654_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e06c61f86144f754fdcb43db2cd56654_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e06c61f86144f754fdcb43db2cd56654_JaffaCakes118
-
Size
204KB
-
MD5
e06c61f86144f754fdcb43db2cd56654
-
SHA1
cbcf7c79b49637aefa8749cd76669419da2486b7
-
SHA256
a43068d5480d399a24ff0279ec6b88d1b2dad706d676c044fe24570b58f84b8a
-
SHA512
2cbb285d90495c7705d6948490411e6499aa5f57b3494fa287a7ee8cf07f20bade7933537db096992787f04478ca041ca0cb6c3f40d93887be7f4ceac9fbf1d6
-
SSDEEP
3072:BHLT1TVqH4/e30xWzDv11QIxcghDHepQ43Jh9jPXuy7wFP7C/zhMsXK:9LTOr30YzpRcsHepQuhBXu6WC/tMs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e06c61f86144f754fdcb43db2cd56654_JaffaCakes118
Files
-
e06c61f86144f754fdcb43db2cd56654_JaffaCakes118.exe windows:5 windows x86 arch:x86
2af9c8c332a366d33dc34c5847a6db87
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
malloc
free
wcscmp
wcsncmp
__CxxFrameHandler
??2@YAPAXI@Z
sprintf
strstr
swprintf
wcscat
??3@YAXPAX@Z
exit
wcsstr
wcslen
wcscpy
mbstowcs
_wcsupr
memmove
wcsrchr
towupper
wcsncpy
fclose
fflush
mbtowc
__mb_cur_max
fopen
wcschr
_c_exit
_exit
_XcptFilter
_cexit
__initenv
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
__dllonexit
_onexit
_controlfp
_except_handler3
advapi32
RegDeleteKeyA
RegOpenKeyExA
RegOpenKeyW
InitiateSystemShutdownW
RegCreateKeyExW
RegSetValueExW
RegUnLoadKeyW
RegLoadKeyW
RegOpenKeyExW
RegQueryValueExW
RegisterEventSourceW
ReportEventW
DeregisterEventSource
RegOpenKeyA
RegQueryValueExA
RegCloseKey
RegisterServiceCtrlHandlerW
LookupPrivilegeValueW
PrivilegeCheck
AllocateAndInitializeSid
FreeSid
CheckTokenMembership
OpenThreadToken
OpenProcessToken
SetServiceStatus
StartServiceCtrlDispatcherW
RegDeleteKeyW
kernel32
DeleteVolumeMountPointW
SetVolumeMountPointW
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
InterlockedDecrement
lstrcatW
GetVolumePathNameW
GetVolumeNameForVolumeMountPointW
lstrcpyW
IsBadReadPtr
IsBadStringPtrW
ExitThread
InterlockedIncrement
lstrlenA
GetFileAttributesW
FindClose
FindFirstFileW
TerminateThread
GetProcAddress
LoadLibraryW
ResumeThread
SetLastError
LocalAlloc
GetComputerNameW
IsBadCodePtr
CompareStringW
lstrcpyA
IsBadWritePtr
GetSystemDirectoryW
WideCharToMultiByte
MultiByteToWideChar
LoadLibraryA
SetEndOfFile
SetFilePointerEx
GetModuleHandleA
CreateFileA
FreeLibrary
GetVolumePathNamesForVolumeNameW
GetCurrentThreadId
HeapAlloc
GetProcessHeap
HeapFree
QueryDosDeviceW
DeviceIoControl
CloseHandle
CreateFileW
DefineDosDeviceW
GetDriveTypeW
Sleep
LocalFree
GetLastError
lstrcmpiA
SetEvent
lstrcmpW
lstrlenW
FormatMessageW
GetModuleHandleW
CreateEventW
WaitForSingleObject
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentThread
CreateThread
SetErrorMode
InitializeCriticalSection
DeleteCriticalSection
user32
PostThreadMessageW
GetMessageW
TranslateMessage
DispatchMessageW
LoadIconW
LoadCursorW
RegisterClassW
CreateWindowExW
ShowWindow
DefWindowProcW
BroadcastSystemMessageW
PostMessageW
DestroyWindow
wsprintfW
LoadStringW
PostQuitMessage
ntdll
NtFlushBuffersFile
NtDeviceIoControlFile
NtQueryVolumeInformationFile
NtQuerySystemTime
RtlAdjustPrivilege
RtlExtendedLargeIntegerDivide
NtQuerySystemInformation
RtlFreeUnicodeString
NtOpenFile
RtlCreateUnicodeString
NtFsControlFile
NtWriteFile
NtReadFile
NtDeleteBootEntry
NtTranslateFilePath
NtEnumerateBootEntries
NtModifyBootEntry
NtQuerySymbolicLinkObject
RtlExtendedIntegerMultiply
RtlInitUnicodeString
NtOpenSymbolicLinkObject
NtClose
ole32
CoSuspendClassObjects
CoRevertToSelf
CoImpersonateClient
CoTaskMemAlloc
CoSetProxyBlanket
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CoRevokeClassObject
CoRegisterClassObject
CoInitializeSecurity
CoInitializeEx
rpcrt4
RpcServerUseProtseqEpW
RpcServerRegisterIf
RpcServerListen
RpcMgmtStopServerListening
RpcServerUnregisterIf
UuidFromStringW
UuidEqual
UuidCreate
RpcImpersonateClient
RpcRevertToSelf
NdrServerCall2
setupapi
SetupDiGetDeviceInterfaceDetailW
SetupDiGetClassDevsW
SetupDiDestroyDeviceInfoList
CM_Locate_DevNodeW
CM_Get_Device_IDW
CM_Get_Device_ID_Size_Ex
CM_Get_DevNode_Status_Ex
SetupDiOpenDeviceInterfaceW
SetupDiCreateDeviceInfoList
SetupDiGetDeviceRegistryPropertyW
SetupDiOpenDeviceInfoW
CM_Get_Parent_Ex
CM_Get_Device_ID_List_ExW
CM_Get_Device_ID_List_Size_ExW
SetupDiEnumDeviceInterfaces
CM_Reenumerate_DevNode_Ex
clusapi
GetNodeClusterState
dmutil
AddEntryBootFileGpt
LowNtWriteFile
LowNtReadFile
LowNtReadOnlyAttributeOff
GetSystemVolume
GetInstallDirectoryPath
LowAcquirePrivilege
DynamicSupport
FreeRgszw
RgszwFromArgs
RgszwFromValist
RgszwDupRgszw
GetErrorData
AddEntryBootFileMbr
TranslateError
osuninst
IsUninstallImageValid
Sections
.text Size: 180KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE