Static task
static1
Behavioral task
behavioral1
Sample
15cb7ba0db554c0d2d81750da1f40bfe_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
15cb7ba0db554c0d2d81750da1f40bfe_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
15cb7ba0db554c0d2d81750da1f40bfe_JaffaCakes118
-
Size
372KB
-
MD5
15cb7ba0db554c0d2d81750da1f40bfe
-
SHA1
5a58d92008e78ddeefd2615d5574b0f89ed47a89
-
SHA256
a047369eff750604ca405a3308ee2f4fee39db246222e61fab7027d26bea3c40
-
SHA512
721360f43eab54b3bd0b38742c75ec0bff897b597e8f6305d4e34d56fc8ad4859c7068b0dadf856f0ab230625054b9ce3dbcd07e6e404830d3131ddf4928f45a
-
SSDEEP
6144:qRlrj1Thns77wo6vA8Y2wNupdFe4l39qBwDkAGfvYHORVy8/0uSrooe/Am4XMP:Grj1o6vA8YbNuU+AWDkAGfvYUh0uSkT3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 15cb7ba0db554c0d2d81750da1f40bfe_JaffaCakes118
Files
-
15cb7ba0db554c0d2d81750da1f40bfe_JaffaCakes118.exe windows:4 windows x86 arch:x86
937dd513ff22a1e4bfb6ddfb564941a4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoSizeA
GetFileVersionInfoA
kernel32
GetPrivateProfileStructA
Sleep
GetCurrentProcessId
lstrlenW
GetTempPathA
DeleteFileA
SetFileAttributesA
GetFileAttributesA
lstrcatA
lstrcpyA
CreateProcessA
SetEvent
OpenEventA
IsBadReadPtr
IsBadWritePtr
TlsFree
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsGetValue
MulDiv
GetLocalTime
GetWindowsDirectoryA
SetCurrentDirectoryA
GetCurrentDirectoryA
CopyFileA
HeapAlloc
GetProcessHeap
lstrcmpA
FindNextFileA
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
DeleteCriticalSection
GetTimeZoneInformation
GetSystemInfo
VirtualProtect
VirtualQuery
HeapSize
LCMapStringW
LCMapStringA
GetCPInfo
GetOEMCP
GetPrivateProfileStringA
VirtualFree
HeapCreate
HeapDestroy
SetUnhandledExceptionFilter
SetLastError
GetCommandLineA
GetStartupInfoA
GetCurrentProcess
TerminateProcess
ExitProcess
HeapReAlloc
HeapFree
RtlUnwind
GetStringTypeA
GetStringTypeW
SetFilePointer
QueryPerformanceCounter
GetTickCount
SetStdHandle
ReadFile
FlushFileBuffers
InitializeCriticalSection
LocalAlloc
GetLastError
LocalFree
GetFileType
GetSystemTimeAsFileTime
GetDateFormatA
GetTimeFormatA
lstrcpynA
InterlockedDecrement
InterlockedIncrement
MultiByteToWideChar
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
GetVersionExA
CreateThread
CloseHandle
lstrlenA
ExpandEnvironmentStringsA
lstrcmpiA
OpenSemaphoreA
CreateSemaphoreA
GetModuleHandleA
SearchPathA
FindFirstFileA
FindClose
FormatMessageA
RaiseException
IsBadCodePtr
GetModuleFileNameA
GetShortPathNameA
WideCharToMultiByte
EnterCriticalSection
GetSystemDirectoryA
LoadLibraryA
LeaveCriticalSection
GetProcAddress
VirtualAlloc
FreeLibrary
CompareStringA
CompareStringW
WriteFile
SetEnvironmentVariableA
user32
ReleaseDC
ClientToScreen
EnumChildWindows
InsertMenuItemA
DestroyMenu
TrackPopupMenu
SystemParametersInfoA
IsIconic
CreatePopupMenu
GetDesktopWindow
CopyRect
AdjustWindowRectEx
GetSystemMetrics
CreateWindowExA
LoadCursorA
RegisterClassA
DefWindowProcA
GetWindowRect
ScreenToClient
SetRect
InvalidateRect
UpdateWindow
GetCursorPos
GetDlgItem
DialogBoxParamA
EndDialog
DestroyIcon
GetMenuItemCount
InSendMessage
RegisterWindowMessageA
LoadIconA
SetForegroundWindow
SetWindowTextA
SetFocus
IsDialogMessageA
ShowWindow
IsWindow
CreateDialogParamA
SetWindowLongA
GetClientRect
MoveWindow
SetWindowPos
EnableWindow
GetParent
CallNextHookEx
GetWindowTextA
SetWindowsHookExA
UnhookWindowsHookEx
MessageBoxA
FindWindowExA
GetWindowThreadProcessId
GetWindowLongA
FindWindowA
CharNextA
GetMessageA
TranslateMessage
DispatchMessageA
PostMessageA
DestroyWindow
SetTimer
KillTimer
LoadImageA
wsprintfA
SendMessageA
GetDC
gdi32
SetTextColor
SelectPalette
RealizePalette
DPtoLP
CreateBitmap
CreateCompatibleBitmap
GetMapMode
SetMapMode
SetBkColor
GetObjectA
TranslateCharsetInfo
GetDeviceCaps
CreateFontIndirectA
GetStockObject
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
DeleteObject
SetBkMode
advapi32
RegCreateKeyExA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegEnumKeyExA
CryptDestroyHash
CryptGetHashParam
CryptHashData
CryptCreateHash
CryptDestroyKey
CryptEncrypt
CryptDecrypt
CryptSignHashA
CryptVerifySignatureA
CryptGetUserKey
CryptReleaseContext
CryptGenKey
CryptAcquireContextA
CryptDeriveKey
RegDeleteValueA
RegQueryInfoKeyA
RegDeleteKeyA
RegQueryValueExA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
Shell_NotifyIconA
ole32
CoTaskMemAlloc
CoTaskMemFree
CoCreateInstance
CoInitialize
CoRegisterClassObject
CLSIDFromString
GetRunningObjectTable
CreateClassMoniker
CoGetClassObject
CoRevokeClassObject
CoDisconnectObject
CoUninitialize
oleaut32
CreateStdDispatch
LoadTypeLi
RegisterTypeLi
UnRegisterTypeLi
SysAllocString
SysAllocStringLen
CreateDispTypeInfo
VariantInit
VariantClear
SysFreeString
Sections
.text Size: 216KB - Virtual size: 212KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.trdata Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE