Static task
static1
Behavioral task
behavioral1
Sample
016d2225b71a7ccb0f28326c7cd1cd9a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
016d2225b71a7ccb0f28326c7cd1cd9a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
016d2225b71a7ccb0f28326c7cd1cd9a_JaffaCakes118
-
Size
108KB
-
MD5
016d2225b71a7ccb0f28326c7cd1cd9a
-
SHA1
7561074ab32e5fdc78b77ee9357ee9e3b7db2520
-
SHA256
44525478b271b45087694947ce1b03542654d96a9259f5af3e9ba4e0e3f2ad57
-
SHA512
cad8e5d3f3e0498af064378d43079459841dbe61da768fde23f08aa2ef0d9c3d21f223f4c4089f73899ea5cec283ec1dab8471cf80ca06028580dffd7c3c8204
-
SSDEEP
3072:qs2iShBkpShALtW6wIo5UXR3zNFJdM2q7:qs2lISALvwIoANF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 016d2225b71a7ccb0f28326c7cd1cd9a_JaffaCakes118
Files
-
016d2225b71a7ccb0f28326c7cd1cd9a_JaffaCakes118.exe windows:4 windows x86 arch:x86
86962700d34d7f05087a2f455db69e8b
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
PlaySoundW
waveOutRestart
waveOutUnprepareHeader
midiOutSetVolume
midiInStart
mmioInstallIOProcA
dinput
DirectInputCreateW
ole32
PropVariantClear
IsEqualGUID
shell32
SHGetSpecialFolderPathW
ShellExecuteA
SHFileOperationW
user32
RegisterWindowMessageW
RegisterShellHookWindow
RegisterClassA
PeekMessageA
OpenClipboard
MsgWaitForMultipleObjects
MessageBoxW
GetTopWindow
GetKeyState
SetSystemCursor
GetCaretPos
EnumPropsA
EmptyClipboard
DispatchMessageA
DialogBoxParamA
DefWindowProcA
CreateWindowExA
CharToOemA
CharLowerBuffA
BeginDeferWindowPos
ShowWindow
UpdateWindow
GetForegroundWindow
ws2_32
WSAUnhookBlockingHook
WSCDeinstallProvider
closesocket
connect
gethostbyname
htons
socket
WSAGetLastError
kernel32
MulDiv
HeapCreate
HeapAlloc
GlobalAddAtomA
GetWindowsDirectoryA
GetVersionExA
GetTimeZoneInformation
ReadFile
GetSystemInfo
GetSystemDefaultLangID
GetStringTypeExA
GetPrivateProfileSectionW
OpenEventW
GetFileAttributesExA
GetCurrentProcessId
GetConsoleOutputCP
GetConsoleAliasA
GetCommandLineA
GetBinaryTypeA
FormatMessageA
FlushConsoleInputBuffer
FindNextVolumeW
FindAtomW
SetEnvironmentVariableA
SetFileTime
GetModuleHandleA
OpenJobObjectW
TlsGetValue
DuplicateHandle
WaitForMultipleObjectsEx
lstrcmpA
GetTempPathW
Beep
BindIoCompletionCallback
CloseHandle
CreateSemaphoreA
DeleteCriticalSection
FindAtomA
EnumTimeFormatsA
ExitProcess
advapi32
GetAclInformation
FileEncryptionStatusA
GetAce
GetSecurityDescriptorDacl
SetUserFileEncryptionKey
SetSecurityDescriptorDacl
I_ScSetServiceBitsA
LookupPrivilegeNameW
RegisterEventSourceA
RegQueryValueExA
OpenTraceW
LsaRemoveAccountRights
LsaSetInformationTrustedDomain
AddAccessDeniedAce
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ