Static task
static1
Behavioral task
behavioral1
Sample
ef14cf4f78f21c10b70a2d8e7df5f27f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef14cf4f78f21c10b70a2d8e7df5f27f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef14cf4f78f21c10b70a2d8e7df5f27f_JaffaCakes118
-
Size
432KB
-
MD5
ef14cf4f78f21c10b70a2d8e7df5f27f
-
SHA1
a273e32e630b97196481ce019db6c97254d19b6a
-
SHA256
7b7fbfb9ac364515a944cd87d2ef6c609fde5f288aae8488a9f4806dcc2f7a5a
-
SHA512
11d48f5768ca4d3281319d4a073a092308ee5022ffc07e7b119f1430502f43034878732cab0973f310081a910df68f1e80a87bd0ff147da0ada6c743a4421455
-
SSDEEP
12288:bOUAkum0E7fhqkUmAcpfWymS4NGxM0MEpPydj+JUCC:l/WymSXMBDR+SCC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef14cf4f78f21c10b70a2d8e7df5f27f_JaffaCakes118
Files
-
ef14cf4f78f21c10b70a2d8e7df5f27f_JaffaCakes118.exe windows:4 windows x86 arch:x86
92c21b7950140afc440ac22e9369d575
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcr80
_time64
sprintf
memmove
strncmp
strchr
atol
??2@YAPAXI@Z
??3@YAXPAX@Z
printf
atoi
_strtoui64
??_U@YAPAXI@Z
_strupr
strrchr
_gmtime32_s
_wcsupr
wcsncmp
wcstombs
??_V@YAXPAX@Z
strncpy
__FrameUnwindFilter
memmove_s
??0exception@std@@QAE@ABQBD@Z
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBDH@Z
??0exception@std@@QAE@XZ
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
??9type_info@@QBE_NABV0@@Z
??8type_info@@QBE_NABV0@@Z
?what@exception@std@@UBEPBDXZ
_purecall
?terminate@@YAXXZ
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_CxxThrowException
_strnicmp
__CxxDetectRethrow
__CxxRegisterExceptionObject
__CxxExceptionFilter
memset
free
malloc
__p__fmode
__p__commode
_configthreadlocale
__wgetmainargs
_XcptFilter
__set_app_type
_amsg_exit
_cexit
__CxxUnregisterExceptionObject
strstr
__CxxQueryExceptionSize
__CxxFrameHandler3
memcpy
_except_handler3
_crt_debugger_hook
_except_handler4_common
_decode_pointer
_onexit
_lock
__dllonexit
_unlock
_encode_pointer
kernel32
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
Sleep
GetModuleHandleA
UnmapViewOfFile
CloseHandle
VirtualProtect
InterlockedExchange
InterlockedDecrement
InterlockedIncrement
GetCurrentProcessId
CreateMutexA
WaitForSingleObject
ReleaseMutex
OpenThread
GetCurrentThreadId
InterlockedPushEntrySList
ReleaseSemaphore
VirtualQuery
FindResourceA
LoadResource
GetCurrentProcess
GetVersionExA
CreateToolhelp32Snapshot
Module32First
GetProcAddress
Module32Next
EnumResourceNamesA
VirtualAlloc
SetEvent
CreateEventA
ExitProcess
GetSystemTime
SystemTimeToFileTime
WaitForMultipleObjects
InterlockedFlushSList
CreateSemaphoreA
InitializeSListHead
CreateThread
GetExitCodeThread
TerminateThread
VirtualFree
GetModuleFileNameA
GetCommandLineW
LocalFree
GlobalAlloc
CreateFileA
DeviceIoControl
CreateFileW
GlobalFree
LoadLibraryA
TlsAlloc
TlsSetValue
TlsGetValue
TlsFree
FreeLibrary
MapViewOfFile
CreateFileMappingA
lstrcmpA
LocalAlloc
GetModuleFileNameW
GetLastError
GetSystemInfo
GetWindowsDirectoryA
GetVolumeInformationA
GetCurrentThread
TerminateProcess
LockResource
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
lstrlenW
MultiByteToWideChar
lstrlenA
WideCharToMultiByte
advapi32
CryptGenRandom
OpenThreadToken
CloseEventLog
ReadEventLogA
GetNumberOfEventLogRecords
OpenEventLogA
RegCloseKey
RegEnumValueA
RegOpenKeyExA
SetThreadToken
CryptAcquireContextA
RevertToSelf
oleaut32
GetErrorInfo
VariantChangeType
SetErrorInfo
CreateErrorInfo
VariantInit
SysFreeString
SystemTimeToVariantTime
SysAllocString
VariantClear
msvcm80
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@P$AAVException@3@@Z
__setusermatherr_m
?ThrowModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVString@System@@@Z
?ThrowNestedModuleLoadException@<CrtImplementationDetails>@@YAXP$AAVException@System@@0@Z
?DoCallBackInDefaultDomain@<CrtImplementationDetails>@@YAXP6GJPAX@Z0@Z
?RegisterModuleUninitializer@<CrtImplementationDetails>@@YAXP$AAVEventHandler@System@@@Z
?DoDllLanguageSupportValidation@<CrtImplementationDetails>@@YAXXZ
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??Y?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV01@PBD@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
?empty@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE_NXZ
?_Myptr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@IBEPBDXZ
?set_new_handler@std@@YAP6AXXZP6AXXZ@Z
?uncaught_exception@std@@YA_NXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
wintrust
CryptCATAdminCalcHashFromFileHandle
CryptCATAdminEnumCatalogFromHash
WinVerifyTrust
CryptCATAdminReleaseContext
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseCatalogContext
CryptCATAdminAcquireContext
crypt32
CertFindCertificateInStore
CertGetNameStringA
CryptMsgClose
CertCloseStore
CryptQueryObject
CryptMsgGetParam
CryptDecodeObject
CertFreeCertificateContext
iphlpapi
GetAdaptersInfo
ole32
CoCreateInstance
CoInitializeEx
CoTaskMemAlloc
CoSetProxyBlanket
CoUninitialize
shell32
CommandLineToArgvW
setupapi
SetupDiGetDeviceRegistryPropertyA
SetupDiGetClassDevsA
SetupDiClassNameFromGuidA
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
SetupDiDestroyDeviceInfoList
SetupDiEnumDeviceInfo
rpcrt4
UuidCreate
mscoree
_CorExeMain
Sections
.text Size: 288KB - Virtual size: 285KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ