Static task
static1
Behavioral task
behavioral1
Sample
fa0aa9d581034c24b248f8a03227b9ba_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fa0aa9d581034c24b248f8a03227b9ba_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fa0aa9d581034c24b248f8a03227b9ba_JaffaCakes118
-
Size
644KB
-
MD5
fa0aa9d581034c24b248f8a03227b9ba
-
SHA1
dfc69498fa27b80f24323f73d5523d189e70e731
-
SHA256
a594f68f60f9f551b7846754b1b860480183609bcfcc50c32c2fb0dbe67544a0
-
SHA512
e41c68ceb6c5bd275ccdd7432ff5084fd742b5d2dd22a18eb7d7a03c6f3f6042c175a00d3083e4fe7e9b873a399239a878097862e874a95e7c228c8ef9d07427
-
SSDEEP
12288:dvL09Smo/ocmvLV3A5X20XcFinm5xlt1XKhNYSXXH:dvwhVLEKxkWS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fa0aa9d581034c24b248f8a03227b9ba_JaffaCakes118
Files
-
fa0aa9d581034c24b248f8a03227b9ba_JaffaCakes118.exe windows:5 windows x86 arch:x86
5d6d4064729e4a41941cb09285e29c1f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileIntA
DeleteFileW
lstrcpy
SetThreadUILanguage
TerminateThread
VirtualAlloc
ReadFile
AreFileApisANSI
ExitProcess
GetBinaryType
GetOverlappedResult
lstrcmp
IsBadCodePtr
RemoveDirectoryA
version
GetFileVersionInfoW
VerLanguageNameA
VerInstallFileW
VerFindFileW
VerInstallFileA
VerFindFileA
VerQueryValueW
GetFileVersionInfoA
GetFileVersionInfoSizeW
GetFileVersionInfoSizeA
VerQueryValueA
VerLanguageNameW
opengl32
glPixelMapfv
glTexCoord3iv
glTexCoord1i
glRotated
glFrustum
glColor4f
glTexCoord3s
glGetTexParameterfv
glDeleteLists
glRectsv
glPrioritizeTextures
glTexParameterfv
glRasterPos2d
glColor3b
glGetMapdv
sqlunirl
_GetShortPathName_@12
_GetServiceDisplayName_@16
_ChangeMenu_@20
_OpenFile_@12
_SHGetPathFromIDList_@8
_IsCharAlphaNumeric_@4
_GetModuleHandle_@4
_ObjectPrivilegeAuditAlarm_@24
_InsertMenuItem_@16
_GetClassInfo@12
_CharLowerBuff_@8
_CreateProcessAsUser_@44
_GetPrivateProfileString_@24
_ShellExecute_@24
_MapVirtualKey_@8
catsrvut
?GetITypeLib@CComPlusTypelib@@QAEPAUITypeLib@@XZ
WinlogonHandlePendingInfOperations
??_7CComPlusMethod@@6B@
RegDBRestore
??4CComPlusTypelib@@QAEAAV0@ABV0@@Z
??1CComPlusInterface@@UAE@XZ
??0CComPlusInterface@@QAE@ABV0@@Z
QueryUserDllW
??1CComPlusComponent@@UAE@XZ
??_7CComPlusInterface@@6B@
DllGetClassObject
CGMIsAdministrator
DllCanUnloadNow
??4CComPlusInterface@@QAEAAV0@ABV0@@Z
??4CComPlusComponent@@QAEAAV0@ABV0@@Z
DllRegisterServer
??0CComPlusComponent@@QAE@ABV0@@Z
user32
GetWindowDC
GetMenu
GetParent
Sections
.text Size: 347KB - Virtual size: 346KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 126KB - Virtual size: 126KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idat_73 Size: 166KB - Virtual size: 240KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ