Static task
static1
Behavioral task
behavioral1
Sample
02967427750f0c07e6f1ccb8a245526b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
02967427750f0c07e6f1ccb8a245526b_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
02967427750f0c07e6f1ccb8a245526b_JaffaCakes118
-
Size
353KB
-
MD5
02967427750f0c07e6f1ccb8a245526b
-
SHA1
e5db9aaa7be074b8725fd9b447f767b84e4a2427
-
SHA256
7ce890a3776c50054bce97a7f317334938a630e806460f79b323b08ee2db507b
-
SHA512
39a7aa1f815a5077d58e00ec3e295bf54eb610e8453e6752fe6825ce45e34f92da86602229925cb59693d0604091d4df54ec8c0096a493c658764f543331b6aa
-
SSDEEP
6144:ZMGpgIMEnJI6F0W+9p+zltHgqYpJtYDNR4w:tpqEnJI6A9cgqYCDP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02967427750f0c07e6f1ccb8a245526b_JaffaCakes118
Files
-
02967427750f0c07e6f1ccb8a245526b_JaffaCakes118.exe windows:6 windows x86 arch:x86
1924ad45c1f1d73a86b0f7e136fc4f92
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DisconnectNamedPipe
FlushFileBuffers
GetFileSizeEx
GetLastError
GetFileInformationByHandleEx
GetProcAddress
SetFileInformationByHandle
CreateNamedPipeA
CancelIoEx
LoadLibraryA
GetProcessWorkingSetSize
CreateFileMappingA
SetConsoleCtrlHandler
CreateEventW
PostQueuedCompletionStatus
WaitForMultipleObjects
CreateIoCompletionPort
GetDiskFreeSpaceExA
CloseHandle
SetEndOfFile
GetStringTypeW
WriteConsoleW
LCMapStringW
CompareStringW
SetStdHandle
HeapReAlloc
OutputDebugStringW
GetOEMCP
GetOverlappedResult
IsValidCodePage
LoadLibraryExW
GetCPInfo
GetCurrentThread
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
Sleep
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetCurrentThreadId
SetLastError
GetStartupInfoW
DeleteCriticalSection
GetFileType
SetFilePointerEx
GetConsoleCP
ReadConsoleW
GetConsoleMode
HeapSize
RtlUnwind
LeaveCriticalSection
EnterCriticalSection
GetModuleFileNameW
GetStdHandle
MultiByteToWideChar
CreateFileW
GetSystemDirectoryA
ReadFile
FileTimeToSystemTime
MulDiv
TransactNamedPipe
CreateEventA
GlobalAlloc
GetEnvironmentStrings
GetDriveTypeA
WriteFile
GetCompressedFileSizeW
FormatMessageA
GetWindowsDirectoryA
GetACP
ExpandEnvironmentStringsA
GetTickCount
ConnectNamedPipe
WaitForSingleObject
QueryDosDeviceA
GetCurrentProcess
MapViewOfFileEx
SystemTimeToFileTime
GlobalAddAtomA
SystemTimeToTzSpecificLocalTime
UnmapViewOfFile
FindFirstFileW
GetFileSize
CreateFileA
GetComputerNameA
GetVolumeNameForVolumeMountPointA
SetCurrentDirectoryW
GetTempPathW
GetTempFileNameW
GetFileAttributesExW
FindNextFileW
AreFileApisANSI
GetModuleHandleExW
ExitProcess
GetProcessHeap
RaiseException
WideCharToMultiByte
GetTimeZoneInformation
IsProcessorFeaturePresent
IsDebuggerPresent
GetCommandLineW
GetModuleHandleA
FindClose
GetLogicalDriveStringsW
GetModuleHandleW
GetSystemTimeAsFileTime
DeleteFileW
DecodePointer
EncodePointer
HeapAlloc
HeapFree
SetEnvironmentVariableA
user32
DefWindowProcW
DestroyIcon
UpdateWindow
CreateWindowExW
ShowWindow
DispatchMessageW
wsprintfW
EndDialog
LoadIconW
DialogBoxParamW
PostQuitMessage
GetMessageW
TranslateAcceleratorW
DestroyWindow
EndPaint
SendMessageW
RegisterClipboardFormatA
CheckMenuItem
RegisterClassExW
LoadAcceleratorsW
GetScrollPos
TranslateMessage
BeginPaint
DrawFrameControl
EnableWindow
GetMessageA
SetWindowRgn
SendDlgItemMessageA
SetCapture
GetFocus
GetParent
GetClientRect
GetScrollRange
GetDC
DrawFocusRect
OffsetRect
LoadImageA
SetWindowLongA
ReleaseDC
GetDlgItem
GetWindowRgn
SendDlgItemMessageW
GetDesktopWindow
GetSysColor
GetCursorPos
IsWindow
DispatchMessageA
MessageBoxW
SystemParametersInfoA
GetSystemMetrics
LoadCursorW
gdi32
SetViewportOrgEx
SetTextColor
DeleteDC
CreateDIBSection
CreateFontA
GetDeviceCaps
DeleteObject
SelectObject
CreateCompatibleDC
CombineRgn
CreateRectRgn
CreateSolidBrush
BitBlt
advapi32
InitializeSecurityDescriptor
RegOpenKeyExW
RegCloseKey
LsaRemoveAccountRights
GetUserNameA
CryptGenKey
FreeSid
AllocateAndInitializeSid
LookupAccountSidW
CryptAcquireContextA
QueryAllTracesA
SetSecurityDescriptorDacl
LsaAddAccountRights
EqualSid
GetTokenInformation
GetUserNameW
OpenThreadToken
OpenProcessToken
RegQueryValueExW
shell32
SHGetDiskFreeSpaceExW
ShellExecuteW
SHGetFolderPathA
SHGetFileInfoA
ole32
CreateStreamOnHGlobal
oleaut32
VarDecSu
OleTranslateColor
comctl32
ImageList_Create
ImageList_ReplaceIcon
ord17
ws2_32
WSAStartup
listen
WSASocketA
closesocket
bind
WSACleanup
shutdown
htons
netapi32
NetUserGetInfo
NetApiBufferFree
NetShareGetInfo
NetUserDel
NetUserAdd
NetLocalGroupAddMembers
mpr
WNetGetConnectionA
WNetAddConnectionA
msi
ord144
msacm32
acmDriverClose
winmm
SendDriverMessage
shlwapi
SHCreateShellPalette
SHAutoComplete
PathFileExistsA
rpcrt4
UuidToStringW
UuidCreate
gdiplus
GdipCreateBitmapFromStream
GdipAlloc
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipSaveImageToStream
GdipFree
GdipCloneImage
opengl32
wglSwapMultipleBuffers
wglSwapLayerBuffers
urlmon
CoInternetParseUrl
Sections
.text Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 188KB - Virtual size: 187KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ