Static task
static1
Behavioral task
behavioral1
Sample
e1ba9828f5ea278d8c290ec056713123_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e1ba9828f5ea278d8c290ec056713123_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e1ba9828f5ea278d8c290ec056713123_JaffaCakes118
-
Size
242KB
-
MD5
e1ba9828f5ea278d8c290ec056713123
-
SHA1
a547a96063b0281cf3969a0da154968a15b30eb2
-
SHA256
628046960c80803417f2f5041da21c4173b34fdbbd56d6bc2df72eedcceef57b
-
SHA512
c60e34fd752496fabee694b37e230bb2b6f7f43eafed5090c77aaedd0c7b84f7113ca847ddc18183e270dcae68f981e37a2ea1c69f177b724d97c7b85fe3dccd
-
SSDEEP
3072:b8U0hnlcBGrY+6uKlNEuZ3mrVf+55m81cg:b8UtBO6IlfmmScg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e1ba9828f5ea278d8c290ec056713123_JaffaCakes118
Files
-
e1ba9828f5ea278d8c290ec056713123_JaffaCakes118.exe windows:5 windows x86 arch:x86
c7311971de8ba92322d38e678b74e993
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
AssocQueryStringA
wnsprintfA
StrNCatA
SHDeleteKeyA
StrToIntA
StrStrIA
userenv
GetProfilesDirectoryA
kernel32
lstrcpyA
RemoveDirectoryA
MoveFileExA
DeleteFileA
lstrcmpiA
CreateProcessA
WriteFile
ReadFile
GetFileSize
CreateFileA
GetTempPathA
GetModuleFileNameA
SetEndOfFile
SetFilePointer
GetVersionExA
Sleep
GetModuleHandleA
GetVolumeInformationA
CreateThread
GetTickCount
ExitProcess
SetErrorMode
SetLastError
GetSystemTimeAsFileTime
lstrcatA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
lstrlenA
FindFirstFileA
GetFileAttributesA
FindNextFileA
FindClose
MultiByteToWideChar
lstrcmpA
ExpandEnvironmentStringsA
HeapFree
LocalFree
GetCurrentProcess
GetProcessHeap
HeapAlloc
OpenProcess
LoadLibraryA
GetProcAddress
FreeLibrary
CloseHandle
GetLastError
lstrcpynA
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
FreeEnvironmentStringsA
GetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
RaiseException
RtlUnwind
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualQuery
user32
SystemParametersInfoA
AdjustWindowRectEx
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
SendDlgItemMessageA
GetDlgItem
RegisterClassExA
GetWindowRect
SetWindowPos
SetWindowTextA
SendMessageA
DestroyWindow
BeginPaint
FillRect
EndPaint
PostQuitMessage
GetWindowLongA
LoadBitmapA
CreateWindowExA
ShowWindow
ExitWindowsEx
GetUserObjectSecurity
GetShellWindow
GetWindowThreadProcessId
MessageBoxA
LoadIconA
LoadCursorA
UpdateWindow
gdi32
CreateSolidBrush
SetBkMode
SetTextColor
CreateCompatibleDC
SelectObject
GetObjectA
BitBlt
DeleteDC
CreateFontA
GetTextExtentPoint32A
TextOutA
GetStockObject
advapi32
RegEnumKeyA
RegQueryInfoKeyA
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyA
RegSetValueExA
ConvertSidToStringSidA
GetUserNameA
GetSecurityDescriptorOwner
IsValidSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
shell32
SHFileOperationA
ShellExecuteA
SHGetFolderPathA
ord680
ShellExecuteExA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ