Static task
static1
Behavioral task
behavioral1
Sample
1343f10d374c3845dd6ebe023ac47fd0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1343f10d374c3845dd6ebe023ac47fd0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1343f10d374c3845dd6ebe023ac47fd0_JaffaCakes118
-
Size
283KB
-
MD5
1343f10d374c3845dd6ebe023ac47fd0
-
SHA1
6ca88af78dc4bcf98aa37bd1d3c5cb705e225939
-
SHA256
057995756a9de72ea2338bc0354054c2acb5eaf7294d696be690039798fc6323
-
SHA512
e83f2ec244f6ac0033307c73d9110d167426d035788fdad44814857ae626779e0a02c00fe5f610e6b65e9646e9b03427c7f5cbce11af90faaee18d44f3df3a30
-
SSDEEP
6144:ZiEEtwizVj0R330Dz7+hca/DCiwMRmGnyEf:ZzEtwiyibzcwimGf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1343f10d374c3845dd6ebe023ac47fd0_JaffaCakes118
Files
-
1343f10d374c3845dd6ebe023ac47fd0_JaffaCakes118.exe windows:5 windows x86 arch:x86
4e67a4b041324b1970f771c82d70e9d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoW
GetLogicalDriveStringsW
GetModuleFileNameW
GetModuleHandleA
GetNumberFormatW
GetPrivateProfileStringW
GetProcessHeap
GetSystemDirectoryW
GetSystemTime
GetSystemTimeAsFileTime
GetTapeParameters
GetTapePosition
GetTapeStatus
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExW
GetVolumeInformationW
GetVolumeNameForVolumeMountPointW
GetVolumePathNameW
GetWindowsDirectoryW
GlobalFree
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LoadResource
LocalFileTimeToFileTime
LocalFree
LockFile
LockResource
GetLocalTime
MultiByteToWideChar
PrepareTape
QueryPerformanceCounter
ReadFile
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryW
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesW
SetFilePointer
SetFileShortNameW
SetFileTime
SetLastError
SetTapeParameters
SetTapePosition
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TerminateProcess
TerminateThread
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringW
WriteTapemark
GetLastError
GetFileSize
GetFileInformationByHandle
GetFileAttributesW
GetExitCodeThread
CreateFileW
GetEnvironmentVariableW
GetDriveTypeW
GetDiskFreeSpaceExW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCurrentDirectoryA
GetComputerNameW
GetCompressedFileSizeW
FreeLibrary
FormatMessageW
FlushFileBuffers
FindVolumeMountPointClose
FindResourceW
FindNextVolumeMountPointW
FindNextFileW
FindFirstVolumeMountPointW
FindFirstFileW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsW
ExitThread
EraseTape
EnterCriticalSection
DeviceIoControl
DeleteFileW
DeleteCriticalSection
CreateThread
CreateSemaphoreW
CreateProcessW
CreateMutexW
CreateHardLinkW
CreateEventW
CreateDirectoryW
CompareStringW
CloseHandle
BackupWrite
BackupSeek
BackupRead
LoadLibraryExW
GetProcAddress
GetStartupInfoW
GetACP
MoveFileExW
user32
LoadCursorA
LoadIconA
LoadIconW
LoadCursorW
advapi32
RegOpenKeyExA
ReportEventW
RegisterEventSourceW
RegUnLoadKeyW
RegSetValueExW
RegSaveKeyW
RegRestoreKeyW
RegReplaceKeyW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyW
RegOpenKeyExW
RegLoadKeyW
RegFlushKey
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyExW
RegConnectRegistryW
RegCloseKey
ReadEncryptedFileRaw
QueryServiceStatus
OpenThreadToken
OpenServiceW
OpenSCManagerW
OpenProcessToken
OpenEncryptedFileRawW
LookupPrivilegeValueW
LookupAccountSidW
InitializeSecurityDescriptor
InitializeAcl
GetUserNameW
GetTokenInformation
GetSecurityDescriptorDacl
GetAce
FreeSid
EqualSid
EnumDependentServicesW
EncryptFileW
DeleteAce
DecryptFileW
ControlService
CloseServiceHandle
CloseEncryptedFileRaw
CheckTokenMembership
AllocateAndInitializeSid
AdjustTokenPrivileges
AddAccessAllowedAce
SetFileSecurityW
SetSecurityDescriptorDacl
StartServiceW
WriteEncryptedFileRaw
SetEntriesInAclW
msvcrt
_CxxThrowException
_XcptFilter
__CxxFrameHandler
__dllonexit
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
_adjust_fdiv
_c_exit
_cexit
_controlfp
_errno
_except_handler3
_exit
_fdopen
_filelength
_ftol
_getpid
_initterm
_local_unwind2
_mbscpy
_mbslen
_onexit
_open_osfhandle
_purecall
_putenv
_snwprintf
_tzset
_vsnwprintf
_wcmdln
_wcsdup
_wcsicmp
_wcslwr
_wcsnicmp
_wcsrev
_wcsupr
_wfopen
_wtoi
calloc
clearerr
exit
fclose
fflush
fread
free
fseek
ftell
fwrite
isalpha
isspace
localtime
malloc
memmove
mktime
realloc
swprintf
swscanf
time
wcscat
wcschr
wcscmp
wcscpy
wcslen
wcsncat
wcsncmp
wcsncpy
wcspbrk
wcsrchr
wcsstr
wcstok
wprintf
Sections
.text Size: 209KB - Virtual size: 209KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ