Static task
static1
Behavioral task
behavioral1
Sample
09c73cc0b26f8447d564986fd66d94ad_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
09c73cc0b26f8447d564986fd66d94ad_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
09c73cc0b26f8447d564986fd66d94ad_JaffaCakes118
-
Size
160KB
-
MD5
09c73cc0b26f8447d564986fd66d94ad
-
SHA1
84d27e169fc5f8af45813d51e3ea7afe0384c711
-
SHA256
bdadecd450587bf91d431231383c6eb39cf3b613c9e3ef67a84d559de15a7ccb
-
SHA512
4edd0fddd6a448cda0c51e5865ef8272d4a91488557e7dc8441de0157cc9983d3157b1d6a27f7167abe55b1934f90d4cdc68911ee3e4e617ab9118427f4922ac
-
SSDEEP
3072:vHdwfbZM+ZzWiiopgEr3EQMalS76CJQKZau5POzmJV:PdQbe+Aou83dZlS7fauBOzmJV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 09c73cc0b26f8447d564986fd66d94ad_JaffaCakes118
Files
-
09c73cc0b26f8447d564986fd66d94ad_JaffaCakes118.exe windows:4 windows x86 arch:x86
6faf884f65506f11bd42b38d98082c01
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
zspool
RegEnumKeyA
GetPrinterDriverA
EnumPrintersA
EnumPrintProcessorsA
DeletePrintProcessorA
DeleteMonitorA
RegDeleteKeyA
EnumPrinterDriversA
DeletePrinterDriverA
EnumJobsA
SetJobA
DeletePrinter
RegDeleteValueA
DeletePrinterConnectionA
RegEnumValueA
GetPrinterDataA
RegOpenKeyA
RegSetValueExA
RegOpenKeyExA
RegCloseKey
GetPrinterDriverDirectoryA
GetPrintProcessorDirectoryA
OpenPrinterA
GetPrinterA
SetPrinterA
ClosePrinter
kernel32
SearchPathA
lstrlenA
GetCurrentDirectoryA
GetTempFileNameA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
GetModuleFileNameA
GetVersionExA
GlobalMemoryStatus
lstrcpyA
CloseHandle
CreateFileA
lstrcatA
CreateDirectoryA
FreeLibrary
GetProcAddress
LoadLibraryA
ReadFile
GetFileSize
WriteFile
SetCurrentDirectoryA
MultiByteToWideChar
SetEndOfFile
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteProfileStringA
GetProfileStringA
lstrcmpiA
WideCharToMultiByte
GetOEMCP
GetCommandLineA
CreateProcessA
GetCurrentProcess
Sleep
WinExec
GetExitCodeProcess
RemoveDirectoryA
MoveFileExA
DeleteFileA
FindClose
FindNextFileA
FindFirstFileA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
HeapDestroy
HeapCreate
VirtualFree
IsBadReadPtr
IsBadWritePtr
IsBadCodePtr
VirtualAlloc
GetStringTypeA
GetStartupInfoA
GetStringTypeW
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapSize
UnhandledExceptionFilter
LCMapStringA
LCMapStringW
GetComputerNameA
FreeEnvironmentStringsA
GetLastError
SetFilePointer
lstrcpynA
GetVersion
TerminateProcess
ExitProcess
GetACP
GetModuleHandleA
RaiseException
RtlUnwind
HeapFree
SetUnhandledExceptionFilter
HeapAlloc
GetCPInfo
user32
EnableMenuItem
CreateDialogParamA
GetDlgCtrlID
GetParent
ExitWindowsEx
RedrawWindow
CharLowerA
SendMessageTimeoutA
LoadStringA
CharNextA
AppendMenuA
GetSystemMenu
GetMessagePos
SetMenuDefaultItem
CheckMenuItem
DeleteMenu
GetSubMenu
LoadMenuA
MessageBoxA
SetTimer
LoadCursorA
ShowWindow
SetFocus
TrackPopupMenu
DialogBoxParamA
DdeInitializeA
DdeCreateStringHandleA
GetClassInfoA
RegisterClassA
BringWindowToTop
SetForegroundWindow
DdeConnect
DdeClientTransaction
DdeDisconnect
ScreenToClient
GetDC
LoadBitmapA
FillRect
ReleaseDC
LoadIconA
SetWindowTextA
GetDesktopWindow
GetWindowRect
SetWindowPos
GetWindowLongA
GetDlgItem
wsprintfA
SendMessageA
EndDialog
SetWindowLongA
IsDlgButtonChecked
FindWindowA
RegisterWindowMessageA
PostMessageA
EnableWindow
SetCursor
KillTimer
CheckRadioButton
MoveWindow
SendDlgItemMessageA
gdi32
DeleteObject
SelectObject
CreateCompatibleDC
GetStockObject
CreateFontIndirectA
GetObjectA
DeleteDC
BitBlt
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
comctl32
ImageList_Draw
ord17
ImageList_LoadImageA
ImageList_Destroy
advapi32
OpenProcessToken
CloseServiceHandle
ControlService
RegQueryValueA
StartServiceA
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
AdjustTokenPrivileges
DeleteService
OpenServiceA
OpenSCManagerA
LookupPrivilegeValueA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
Sections
.text Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ