Static task
static1
Behavioral task
behavioral1
Sample
ef3d7eb2b17002d551edb246c541f99c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ef3d7eb2b17002d551edb246c541f99c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ef3d7eb2b17002d551edb246c541f99c_JaffaCakes118
-
Size
556KB
-
MD5
ef3d7eb2b17002d551edb246c541f99c
-
SHA1
30247b57c3a4ee49168e4d4f79dfbbd8b22484a5
-
SHA256
a3c954bdcc0d657c24afd0aec66f36845d7fe42e4cf2e26605d2ce548714322a
-
SHA512
691257f4b81e555875f577bf4e36ea3273ca3eff48843dedbfb1d49951d955048edcb9f78ca4b06bc0680149b79af4ec383355e51d6fb4cf40969334fdfd92c8
-
SSDEEP
12288:y3npJhH8JNni7GJrgICNmLbiUvgLBS/AEpsPuS:enpj8ni7GJrMNmqUASJsPd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ef3d7eb2b17002d551edb246c541f99c_JaffaCakes118
Files
-
ef3d7eb2b17002d551edb246c541f99c_JaffaCakes118.exe windows:4 windows x86 arch:x86
69524eea86785490515a912e99ceab3c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
wininet
InternetAutodial
InternetCrackUrlW
InternetTimeToSystemTime
user32
GetMenuStringA
GetGUIThreadInfo
GetDlgItemTextW
ToAsciiEx
GetShellWindow
SetCaretPos
SetMenuDefaultItem
EndDeferWindowPos
GetWindowWord
GetAncestor
GetCaretBlinkTime
ReuseDDElParam
LoadCursorA
GetKeyboardState
CallWindowProcW
GetFocus
CopyAcceleratorTableA
EnumDesktopsA
GetClipboardFormatNameW
RegisterClassExA
SetDlgItemInt
RegisterClassA
GetMessageW
EnumPropsA
PeekMessageW
advapi32
GetUserNameA
RegDeleteKeyA
CreateServiceA
CryptSetProviderExA
RegSetValueExA
RegCreateKeyExA
LookupPrivilegeValueW
RegSetKeySecurity
CryptGetDefaultProviderA
LookupPrivilegeDisplayNameA
RegQueryValueW
InitializeSecurityDescriptor
LogonUserW
LookupAccountNameW
InitiateSystemShutdownW
LookupAccountSidA
AbortSystemShutdownA
CryptHashSessionKey
CryptEncrypt
RegQueryValueExW
CryptExportKey
CryptHashData
RegSetValueExW
DuplicateToken
CryptVerifySignatureA
kernel32
VirtualQueryEx
HeapSize
GetVersionExA
GetPrivateProfileSectionA
GetStdHandle
InterlockedIncrement
GetWindowsDirectoryW
CreateFileA
DeleteCriticalSection
SystemTimeToFileTime
CompareStringW
MultiByteToWideChar
ExitProcess
CreateMutexA
GetStringTypeExA
GetStringTypeW
GetLastError
GetSystemTimeAsFileTime
UnhandledExceptionFilter
CloseHandle
GetEnvironmentStrings
WriteConsoleA
InitializeCriticalSection
GetConsoleOutputCP
TlsSetValue
GetModuleHandleA
ContinueDebugEvent
SetLastError
GetCurrentThreadId
LeaveCriticalSection
GetCurrentProcess
GetStartupInfoA
GetConsoleMode
GetCommandLineA
GetCPInfo
HeapCreate
GetDateFormatA
FreeResource
GetConsoleCP
IsDebuggerPresent
SetEnvironmentVariableA
GetTimeFormatA
RtlFillMemory
OpenMutexA
HeapAlloc
GetOEMCP
GetCurrentThread
WriteConsoleW
GetUserDefaultLCID
IsValidCodePage
GetLocaleInfoW
FlushFileBuffers
EnumSystemLocalesA
GetTickCount
EnterCriticalSection
LCMapStringA
DeleteFileW
VirtualFree
lstrlenA
TerminateProcess
FindResourceA
GetProcAddress
lstrcatW
SetConsoleCtrlHandler
GetStringTypeA
LCMapStringW
ReadFile
TlsFree
RtlUnwind
lstrcpyn
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
TlsGetValue
FreeEnvironmentStringsW
HeapReAlloc
WriteFile
GetProcessHeap
VirtualQuery
FreeLibrary
SetHandleCount
OpenEventW
GetModuleFileNameA
GetFileType
InterlockedExchange
GetTimeZoneInformation
GetACP
IsValidLocale
InterlockedDecrement
WideCharToMultiByte
LoadLibraryA
FreeEnvironmentStringsA
HeapFree
GetFileAttributesExA
TlsAlloc
SetFilePointer
Sleep
GetSystemDirectoryA
SetStdHandle
SetUnhandledExceptionFilter
VirtualAlloc
HeapDestroy
GetLocaleInfoA
CompareStringA
Sections
.text Size: 223KB - Virtual size: 223KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 315KB - Virtual size: 314KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ