Static task
static1
Behavioral task
behavioral1
Sample
eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118
-
Size
845KB
-
MD5
eab2df02d7c5647e4b2838349d81f7d2
-
SHA1
f10d2e0ed5c13f04190cc141b51f1f60368f8164
-
SHA256
e6c88149ac0c62690a6416eb46c5af8f790c2f25da974737ae7cb196e40b5f2b
-
SHA512
5bbae44eb653d659528df12ba81022df23f055dff81fa45cff6ea1fecb8aaa87e23a46ce7f004c904251d62344f5a28e1364db523abb9e62fafa5c03feb96cac
-
SSDEEP
24576:1fUT67H4f6l1iIf9mT9SiwDzZr+pHlgQzlxn68bpVFnh:1fi6LJ/5nZr+VlgQzlxhFVFnh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118
Files
-
eab2df02d7c5647e4b2838349d81f7d2_JaffaCakes118.exe windows:5 windows x86 arch:x86
eae53ecf6e19a63ad8aef92ad44ca049
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiW
CreateThread
GetShortPathNameW
LoadLibraryW
GetDiskFreeSpaceW
lstrcmpiA
lstrcmpW
GetExitCodeProcess
GetPrivateProfileStringW
FindClose
DeleteFileW
MulDiv
OpenProcess
GetCurrentProcess
lstrcpynA
ExitProcess
SetErrorMode
CopyFileW
LoadLibraryA
lstrcpyA
MoveFileW
lstrcpynW
GetFileSize
lstrcpyW
RemoveDirectoryW
GetVersion
WideCharToMultiByte
CreateFileW
ExpandEnvironmentStringsW
GetTickCount
ReadFile
Sleep
CreateProcessW
GetLastError
GlobalAlloc
SetCurrentDirectoryW
GetFullPathNameW
GetSystemDirectoryA
lstrcatA
VirtualProtectEx
GetVersionExW
GlobalFree
FreeLibrary
GetSystemDirectoryW
GetProcAddress
GetCommandLineW
SearchPathW
SetFileTime
GetTempPathW
CloseHandle
WritePrivateProfileStringW
GetTempFileNameW
GlobalUnlock
SetFileAttributesW
FindNextFileW
lstrcatW
GetFileAttributesW
LoadLibraryExW
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
FindFirstFileW
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
GetModuleHandleW
GetModuleHandleA
SetFilePointer
CreateDirectoryW
lstrlenA
CompareFileTime
GlobalLock
lstrlenW
WriteFile
WaitForSingleObject
GetWindowsDirectoryW
MultiByteToWideChar
user32
CreateWindowExW
ShowWindow
DrawTextW
PostQuitMessage
DefWindowProcW
EmptyClipboard
ExitWindowsEx
MessageBoxIndirectW
EnableWindow
SetClipboardData
IsWindowVisible
GetSystemMetrics
PeekMessageW
SetWindowPos
IsWindowEnabled
CallWindowProcW
EndPaint
DispatchMessageW
IsWindow
wsprintfW
ScreenToClient
CreatePopupMenu
CharPrevW
GetSysColor
GetWindowRect
CharUpperW
FillRect
SetForegroundWindow
FindWindowExW
CharNextW
TrackPopupMenu
LoadBitmapW
wsprintfA
SetWindowTextW
GetClassInfoW
SendMessageTimeoutW
SetCursor
SetClassLongW
DestroyWindow
SendMessageW
GetDlgItemTextW
SetTimer
BeginPaint
GetMessagePos
SetWindowLongW
GetDC
CharNextA
GetClientRect
GetWindowLongW
SystemParametersInfoW
LoadCursorW
OpenClipboard
CheckDlgButton
LoadImageW
InvalidateRect
AppendMenuW
GetDlgItem
GetSystemMenu
EndDialog
CreateDialogParamW
RegisterClassW
CloseClipboard
DialogBoxParamW
EnableMenuItem
SetDlgItemTextW
gdi32
DeleteObject
SetTextColor
SelectObject
CreateBrushIndirect
GetDeviceCaps
SetBkMode
CreateFontIndirectW
SetBkColor
advapi32
RegQueryValueExW
RegSetValueExW
RegEnumValueW
RegDeleteKeyW
RegCreateKeyExW
RegEnumKeyW
RegCloseKey
RegOpenKeyExW
RegDeleteValueW
shell32
SHBrowseForFolderW
ShellExecuteW
SHFileOperationW
SHGetSpecialFolderLocation
SHGetPathFromIDListW
SHGetFileInfoW
ole32
CoCreateInstance
OleInitialize
CoTaskMemFree
OleUninitialize
comctl32
ord17
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
msvcrt
_c_exit
_exit
_XcptFilter
_cexit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_except_handler3
exit
fclose
fopen
fread
oleacc
ObjectFromLresult
esent
JetEndSession
Sections
.text Size: 523KB - Virtual size: 523KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.joke Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.poke Size: 1024B - Virtual size: 666B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zt Size: - Virtual size: 180KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hk Size: 50KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zx Size: 199KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zz Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ