Static task
static1
Behavioral task
behavioral1
Sample
15bc2cef9cee256785fc5d9ad47863b1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15bc2cef9cee256785fc5d9ad47863b1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
15bc2cef9cee256785fc5d9ad47863b1_JaffaCakes118
-
Size
264KB
-
MD5
15bc2cef9cee256785fc5d9ad47863b1
-
SHA1
fa263573fa2b5d8b22204ff7c66bd30e396c386c
-
SHA256
ffca0ed1d3a1b7ee810dd8b25fef68c22da54e691594646fc8031d0aab584744
-
SHA512
62355d79edd372f61939855fdafcafcf1754b711d866bcd39d4c35053b1c4e94356d37f5d00febcd5725ef160c6b9c857c3f5e444cc245f326738abc6380ebbf
-
SSDEEP
6144:U0AIQoohQTTZ2zlPg8i4OP+72Q1uOWySpOS3Oa9Hx0/TgxLtd:aIQwwuF4bPuON65hhd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15bc2cef9cee256785fc5d9ad47863b1_JaffaCakes118
Files
-
15bc2cef9cee256785fc5d9ad47863b1_JaffaCakes118.exe windows:4 windows x86 arch:x86
0e6237fb48fb1592e5d988e14c9105c2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFullPathNameA
GlobalHandle
lstrcatA
WideCharToMultiByte
GetDriveTypeW
GetExitCodeThread
GetCurrentDirectoryW
CreateEventW
lstrlenA
SetProcessWorkingSetSize
SetUnhandledExceptionFilter
GetProcessAffinityMask
CreateFileMappingA
WritePrivateProfileStringW
CreateTimerQueueTimer
WriteConsoleW
EnumResourceLanguagesA
MoveFileA
GetVersion
FlushInstructionCache
LoadLibraryExA
IsBadReadPtr
FindNextFileA
OutputDebugStringA
LCMapStringW
CreateMutexA
GetDiskFreeSpaceExW
GetVolumeInformationA
GetUserGeoID
WritePrivateProfileStringA
SetFileAttributesA
WaitForSingleObject
GlobalFindAtomW
VirtualFree
CreateMutexW
IsBadCodePtr
FileTimeToDosDateTime
GetSystemPowerStatus
MoveFileW
IsDebuggerPresent
OpenFile
GetDriveTypeA
_llseek
UnlockFile
GetProfileStringW
lstrcmpW
FindNextFileW
DeleteTimerQueueTimer
GetProcessHeap
QueryDosDeviceA
TlsGetValue
SetEndOfFile
CreateDirectoryW
MapViewOfFile
GetFileAttributesExW
CreateSemaphoreW
GetLogicalDrives
FlushFileBuffers
CreateFileA
GetUserDefaultUILanguage
GetModuleHandleA
GetStartupInfoA
ExitProcess
GetProcAddress
TerminateProcess
GetCurrentProcess
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
RtlUnwind
FreeEnvironmentStringsA
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
HeapFree
WriteFile
InterlockedDecrement
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
HeapReAlloc
MultiByteToWideChar
LCMapStringA
GetStringTypeA
GetStringTypeW
LoadLibraryA
GetTickCount
_lread
GetModuleFileNameA
GetLogicalDriveStringsA
SetFilePointerEx
GetWindowsDirectoryW
WinExec
LoadResource
FreeEnvironmentStringsW
GetFileSizeEx
GetLocalTime
GetCurrentDirectoryA
SetCurrentDirectoryA
lstrcmpA
ExpandEnvironmentStringsW
OpenFileMappingA
GetShortPathNameA
MapViewOfFileEx
InitializeCriticalSection
VirtualQueryEx
PulseEvent
GetVolumeInformationW
WaitForMultipleObjectsEx
CompareStringA
FormatMessageA
UnhandledExceptionFilter
GetTempFileNameA
SetThreadPriority
GetLastError
CreateProcessW
GetTempPathA
QueryDosDeviceW
IsProcessorFeaturePresent
GetEnvironmentStrings
SetStdHandle
GetCommandLineA
Beep
VirtualAlloc
comctl32
ImageList_SetBkColor
ImageList_Replace
PropertySheetA
ole32
CoResumeClassObjects
CoTreatAsClass
CoUnmarshalInterface
CreateGenericComposite
CLSIDFromProgID
CreateOleAdviseHolder
CoCreateInstance
OleRegEnumVerbs
comdlg32
CommDlgExtendedError
GetSaveFileNameA
GetFileTitleW
shlwapi
StrRetToBufW
PathIsUNCA
StrCatBuffA
shell32
Shell_NotifyIconA
Shell_NotifyIconW
SHGetSpecialFolderLocation
SHGetFolderPathW
version
GetFileVersionInfoA
oleaut32
GetActiveObject
user32
CreateDialogParamA
CreateCaret
SendDlgItemMessageW
ShowWindow
DispatchMessageW
GetAsyncKeyState
EnumChildWindows
EnumThreadWindows
GetScrollInfo
GetSystemMenu
SendMessageA
WindowFromDC
SetCursor
AppendMenuA
EmptyClipboard
ValidateRect
CopyAcceleratorTableW
IsDlgButtonChecked
CopyRect
LoadImageW
LoadKeyboardLayoutA
DrawTextExA
DrawTextW
InvalidateRgn
CreateWindowExW
WindowFromPoint
SetPropW
GetNextDlgTabItem
GetDlgItemInt
LoadIconA
DdeAccessData
SetWindowPos
SetFocus
GetKeyboardLayout
SubtractRect
SetMenuItemInfoA
FrameRect
MsgWaitForMultipleObjects
WinHelpA
LoadMenuA
GetActiveWindow
RegisterClipboardFormatA
SetMenuDefaultItem
GrayStringA
SetWindowTextW
CharNextA
EnableWindow
PostThreadMessageW
IsChild
GetWindowTextA
UpdateLayeredWindow
advapi32
AllocateAndInitializeSid
SetSecurityDescriptorDacl
BuildExplicitAccessWithNameW
SetSecurityDescriptorOwner
ConvertSidToStringSidW
LookupAccountNameW
RegSetValueExA
RegEnumValueA
CryptReleaseContext
ControlService
DeleteService
MakeSelfRelativeSD
RegDeleteValueW
CryptDestroyKey
OpenProcessToken
RegEnumKeyExA
gdi32
Pie
LPtoDP
SetStretchBltMode
PatBlt
GetDCOrgEx
SelectPalette
PlayEnhMetaFile
SetMetaFileBitsEx
StartDocA
GetOutlineTextMetricsW
SetPixel
GetCharWidthW
DeleteDC
GdiFlush
Escape
SetBrushOrgEx
Sections
.text Size: 217KB - Virtual size: 216KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ