Static task
static1
Behavioral task
behavioral1
Sample
eb4b541317211f2e64b75d653cf909b5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb4b541317211f2e64b75d653cf909b5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb4b541317211f2e64b75d653cf909b5_JaffaCakes118
-
Size
1.8MB
-
MD5
eb4b541317211f2e64b75d653cf909b5
-
SHA1
2bce4e8ca39a336b9aa9dba5c7d601173909e320
-
SHA256
a73e7076875d269f8e0dc3b61a2a2b450d85db8a2992aee383ab50c6fa066378
-
SHA512
79705ffca8f044468b1afb7c7b9f178b27106588b39c2f1e0fbe58665530bde5ed22f0ed1592a51c21f7271f86de31bba1e46603ba13b9061b1ee9293c634875
-
SSDEEP
49152:C3d0XSer7Ejc8h6KYVTAGO00WEGXk3aOTkb:Wd0fnEjc8h6llTEUk3aOIb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource eb4b541317211f2e64b75d653cf909b5_JaffaCakes118
Files
-
eb4b541317211f2e64b75d653cf909b5_JaffaCakes118.exe windows:5 windows x86 arch:x86
16351023d41c88b5a2ff7e6a02659bbd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Process32First
Process32FirstW
Process32Next
Process32NextW
QueryInformationJobObject
QueryPerformanceCounter
RaiseException
ReadConsoleOutputW
ReadConsoleW
ReadFile
ReadProcessMemory
RemoveDirectoryA
RemoveDirectoryW
RtlUnwind
RtlZeroMemory
ScrollConsoleScreenBufferW
SearchPathA
SetConsoleCursorPosition
SetConsoleMode
SetFileAttributesA
SetFileAttributesW
SetFilePointer
SetHandleCount
SetLastError
SetPriorityClass
SetProcessWorkingSetSize
SetStdHandle
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
Toolhelp32ReadProcessMemory
TransmitCommChar
OutputDebugStringW
UnmapViewOfFile
VerSetConditionMask
VerifyVersionInfoW
VirtualFree
VirtualQuery
WaitForDebugEvent
WaitForMultipleObjects
WideCharToMultiByte
WriteConsoleA
WriteConsoleOutputAttribute
WriteConsoleW
WriteFile
WriteProfileStringW
_lcreat
_lopen
lstrcatA
lstrcatW
lstrcmpW
lstrcmpiA
lstrcmpiW
lstrcpyA
lstrcpyW
lstrcpynW
lstrlenW
OutputDebugStringA
OpenProcess
MultiByteToWideChar
MoveFileExW
Module32NextW
Module32Next
Module32FirstW
Module32First
LocalFree
LocalAlloc
LoadLibraryW
LoadLibraryExW
LoadLibraryA
LeaveCriticalSection
LCMapStringW
LCMapStringA
IsValidCodePage
IsDebuggerPresent
IsBadWritePtr
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
InterlockedCompareExchange
InitializeCriticalSectionAndSpinCount
InitializeCriticalSection
HeapSize
HeapSetInformation
HeapReAlloc
HeapLock
HeapFree
HeapCreate
HeapAlloc
GetWriteWatch
GetVolumeInformationW
GetVersionExA
GetVersion
GetTimeFormatW
GetTickCount
GetTempPathA
GetTempFileNameW
GetSystemTimeAsFileTime
GetSystemTime
GetSystemDirectoryW
GetStringTypeW
GetStringTypeA
GetStdHandle
GetStartupInfoA
GetShortPathNameW
GetProcessHeap
GetProcAddress
GetPriorityClass
GetOverlappedResult
GetOEMCP
GetNamedPipeHandleStateW
GetModuleHandleW
GetModuleFileNameW
GetModuleFileNameA
GetMailslotInfo
GetLogicalDrives
GetLocaleInfoA
GetLastError
GetFileType
GetFileTime
GetFileSize
GetFileAttributesW
GetFileAttributesExW
GetFileAttributesExA
GetEnvironmentStringsW
GetEnvironmentStrings
GetDriveTypeW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetConsoleScreenBufferInfo
GetConsoleOutputCP
GetConsoleMode
GetConsoleCP
GetComputerNameW
GetComputerNameExW
GetCommandLineA
GetCPInfo
GetBinaryTypeA
GetACP
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageW
FlushFileBuffers
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
FileTimeToSystemTime
ExitProcess
EnumLanguageGroupLocalesA
EnterCriticalSection
EncodePointer
DuplicateHandle
DisconnectNamedPipe
DeviceIoControl
DeleteFileW
DeleteFileA
DeleteCriticalSection
DefineDosDeviceA
DecodePointer
DebugActiveProcess
CreateToolhelp32Snapshot
CreateThread
CreateTapePartition
CreateNamedPipeA
CreateFileW
CreateFileA
CreateEventW
CreateEventA
CreateDirectoryW
CopyFileW
ConvertThreadToFiber
ConnectNamedPipe
CompareStringW
CloseHandle
BackupSeek
BackupRead
AllocateUserPhysicalPages
GetModuleHandleA
SetErrorMode
UnhandledExceptionFilter
VirtualAlloc
user32
GetLastActivePopup
GetGuiResources
GetDlgItemTextA
GetCursorInfo
GetClientRect
GetCapture
ExitWindowsEx
EnumDisplaySettingsExW
EnumDesktopWindows
EnableMenuItem
DrawIconEx
DrawIcon
DrawFrame
CreateWindowExW
CreateIconFromResource
CreateIcon
CopyAcceleratorTableW
CharUpperBuffW
IsMenu
GetMenuCheckMarkDimensions
GetDlgCtrlID
IsCharAlphaNumericW
DrawMenuBar
GetOpenClipboardWindow
GetActiveWindow
GetParent
GetSystemMetrics
CharNextA
GetMenuItemCount
GetTopWindow
GetPropA
GetKBCodePage
ShowCaret
LoadIconA
GetClipboardData
GetDC
CreatePopupMenu
GetListBoxInfo
WindowFromDC
GetDesktopWindow
GetMessageTime
GetKeyboardLayout
GetShellWindow
DestroyCursor
CharLowerA
LoadCursorFromFileW
CloseClipboard
GetForegroundWindow
GetDoubleClickTime
DestroyIcon
IsWindowUnicode
GetCursor
GetMessagePos
GetMessageExtraInfo
IsCharAlphaNumericA
GetFocus
GetAsyncKeyState
GetTitleBarInfo
GetWindowLongA
GetWindowThreadProcessId
IsCharUpperA
IsDialogMessage
IsCharUpperW
IsCharAlphaA
IsWindowEnabled
GetWindowContextHelpId
IsRectEmpty
LoadAcceleratorsW
LoadIconW
LoadKeyboardLayoutA
LoadStringA
MessageBoxW
OemToCharBuffA
OpenClipboard
PostThreadMessageA
SendMessageCallbackW
SetClassLongW
SetMenuInfo
SetUserObjectInformationA
SetWindowTextA
ValidateRect
wsprintfA
wvsprintfW
InSendMessage
CopyIcon
IsGUIThread
DestroyWindow
GetWindowTextLengthA
GetQueueStatus
GetDialogBaseUnits
GetSysColorBrush
GetClipboardViewer
gdi32
SetSystemPaletteUse
SetGraphicsMode
bInitSystemAndFontsDirectoriesW
RemoveFontResourceW
PolyPolyline
PolyBezierTo
PlgBlt
HT_Get8BPPFormatPalette
GetTextFaceA
GetTextExtentPointI
GetTextExtentExPointWPri
GetTextCharset
GetRasterizerCaps
GetKerningPairsW
GetGraphicsMode
GetGlyphOutlineWow
GetEnhMetaFilePaletteEntries
GetDCPenColor
GetStretchBltMode
EndDoc
GetEnhMetaFileA
GetBkMode
GdiGetBatchLimit
CreatePatternBrush
GetTextColor
UnrealizeObject
GetObjectType
DeleteDC
StrokePath
GetBkColor
GetPolyFillMode
GetROP2
GetFontLanguageInfo
GetColorSpace
CreateHalftonePalette
RealizePalette
DeleteColorSpace
WidenPath
EndPath
FillPath
FlattenPath
GetTextAlign
AbortDoc
AddFontResourceW
EndPage
Arc
CombineTransform
CreateCompatibleBitmap
CreateMetaFileW
CreatePalette
CreatePenIndirect
CreatePolyPolygonRgn
DeleteEnhMetaFile
DrawEscape
EngDeletePath
EngLineTo
EngMultiByteToUnicodeN
EngTransparentBlt
EnumObjects
ExtFloodFill
FONTOBJ_pxoGetXform
GdiFixUpHandle
GdiGetCharDimensions
TextOutA
GetBrushOrgEx
GdiTransparentBlt
advapi32
StartServiceCtrlDispatcherA
StartServiceA
SetServiceStatus
SetNamedSecurityInfoW
SetNamedSecurityInfoA
SetEntriesInAclA
RevertToSelf
RegisterServiceCtrlHandlerA
RegSetValueExW
RegSetValueExA
RegSaveKeyW
RegReplaceKeyW
RegQueryValueExW
RegQueryInfoKeyW
RegQueryInfoKeyA
RegOpenUserClassesRoot
RegOpenKeyExW
RegOpenKeyExA
RegOpenKeyA
RegOpenCurrentUser
RegLoadKeyW
RegLoadKeyA
RegEnumValueW
RegEnumValueA
RegEnumKeyW
RegEnumKeyExW
RegEnumKeyA
RegDeleteValueW
RegDeleteKeyW
RegDeleteKeyA
RegCreateKeyExW
RegCreateKeyA
RegCloseKey
QueryServiceStatusEx
OpenServiceW
OpenServiceA
OpenSCManagerW
OpenSCManagerA
OpenProcessToken
LookupPrivilegeValueW
LookupPrivilegeValueA
ImpersonateNamedPipeClient
GetTokenInformation
FreeSid
EnumServicesStatusExW
EnumServicesStatusExA
DeleteService
CreateServiceW
CreateServiceA
ConvertStringSecurityDescriptorToSecurityDescriptorA
ConvertSidToStringSidW
ConvertSidToStringSidA
ControlService
CloseServiceHandle
ChangeServiceConfigW
ChangeServiceConfig2A
AllocateAndInitializeSid
AdjustTokenPrivileges
RegOpenKeyW
RegQueryValueExA
StartServiceW
shell32
SHGetSpecialFolderLocation
SHGetMalloc
DuplicateIcon
SHGetPathFromIDListA
ole32
CoInitialize
CoCreateInstance
CoInitializeSecurity
shlwapi
SHSetValueA
SHGetValueW
SHGetValueA
SHDeleteValueW
SHDeleteValueA
SHDeleteKeyW
SHSetValueW
SHCopyKeyW
PathRemoveFileSpecA
PathIsDirectoryW
PathFileExistsW
PathAppendA
PathAddBackslashA
StrCatW
StrCpyW
StrStrA
SHDeleteKeyA
StrStrIA
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ