Static task
static1
Behavioral task
behavioral1
Sample
06b122d375621fb5353dac4371799a21_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06b122d375621fb5353dac4371799a21_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
06b122d375621fb5353dac4371799a21_JaffaCakes118
-
Size
4.0MB
-
MD5
06b122d375621fb5353dac4371799a21
-
SHA1
9e933019b4502ac77416cbb29c03c2aac94deb66
-
SHA256
a6e52326ef1a579fc5f7fec95bdf81690232c0900e1f673e8a0926f56de7fb8d
-
SHA512
a8ce349917d2694c34a5b6c5bd3d3d89f8e5cf26ba0100fbbf0fc6bd4253f40527537810085754f7ba87f8f9190d504d58931a083777b64da4aa10133e32f165
-
SSDEEP
98304:CMnHf0DuvDE8b4VMyiXFAh0RijkxkXAHNnjPET9:CMn/Ouvw8NyqASRijkxkXMIT9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 06b122d375621fb5353dac4371799a21_JaffaCakes118
Files
-
06b122d375621fb5353dac4371799a21_JaffaCakes118.exe windows:4 windows x86 arch:x86
33756becaf68f226d121fe753cacc476
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileStringA
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetOEMCP
GetACP
GetCPInfo
LCMapStringW
LCMapStringA
IsBadWritePtr
GetVersion
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
MoveFileA
DeleteFileA
RtlUnwind
SetEnvironmentVariableA
CreateDirectoryA
HeapFree
HeapAlloc
HeapCompact
TerminateProcess
ExitProcess
GetFileAttributesA
SetFileAttributesA
GetVersionExA
GetModuleFileNameA
GetDriveTypeA
GetCurrentProcess
MoveFileExA
FormatMessageA
SetFileTime
WritePrivateProfileStringA
OpenFile
SetErrorMode
GetLocalTime
GetFullPathNameA
FindFirstFileA
FindClose
MultiByteToWideChar
WideCharToMultiByte
GetTempPathA
GetShortPathNameA
GetExitCodeProcess
GetCurrentDirectoryA
SetCurrentDirectoryA
CreateProcessA
lstrcatA
lstrlenA
WinExec
LoadLibraryA
GetProcAddress
FreeLibrary
GetDiskFreeSpaceA
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
CloseHandle
SetFilePointer
WriteFile
ReadFile
CreateFileA
GetLastError
GetWindowsDirectoryA
HeapReAlloc
GetSystemDirectoryA
user32
DialogBoxParamA
ExitWindowsEx
IsIconic
PostQuitMessage
BringWindowToTop
AdjustWindowRectEx
PostMessageA
EndDialog
IsDlgButtonChecked
CheckDlgButton
GetLastActivePopup
FindWindowA
RegisterClassA
LoadCursorA
DefWindowProcA
GetWindow
SendMessageA
GetSysColor
ScreenToClient
GetWindowRect
GetDlgItem
EndPaint
BeginPaint
GetClientRect
FillRect
SetTimer
GetDlgItemTextA
SendDlgItemMessageA
CheckRadioButton
SetFocus
GetParent
UpdateWindow
IsWindowVisible
InvalidateRect
CreateDialogParamA
RedrawWindow
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
SetDlgItemTextA
SetWindowTextA
SetWindowPos
ShowWindow
DestroyWindow
CreateWindowExA
GetWindowLongA
IsWindowEnabled
EnableWindow
CallWindowProcA
ValidateRect
SetWindowLongA
GetClassNameA
MessageBoxA
PeekMessageA
wsprintfA
GetSystemMetrics
DrawTextA
LoadIconA
gdi32
DeleteDC
GetDeviceCaps
GetSystemPaletteEntries
CreatePalette
SetBkColor
DeleteObject
CreateFontIndirectA
RemoveFontResourceA
GetStockObject
BitBlt
SelectObject
CreateCompatibleBitmap
CreateCompatibleDC
RealizePalette
SelectPalette
CreateHalftonePalette
CreateDIBPatternBrush
CreateSolidBrush
SetBrushOrgEx
SetStretchBltMode
StretchDIBits
SetTextColor
ExtTextOutA
AddFontResourceA
SetBkMode
advapi32
RegDeleteValueA
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegCreateKeyA
RegCloseKey
RegOpenKeyA
RegSetValueExA
RegQueryValueA
RegOpenKeyExA
RegQueryValueExA
shell32
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
ole32
OleInitialize
CoCreateInstance
CoGetMalloc
OleUninitialize
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
VerFindFileA
comctl32
ord17
Sections
.text Size: 92KB - Virtual size: 90KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ