Static task
static1
Behavioral task
behavioral1
Sample
172c73647c8daf062e6761612bf063ce_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
172c73647c8daf062e6761612bf063ce_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
172c73647c8daf062e6761612bf063ce_JaffaCakes118
-
Size
265KB
-
MD5
172c73647c8daf062e6761612bf063ce
-
SHA1
bd453c89ad6fc270c4e9ec20111998906a6a3d64
-
SHA256
c93e2dcc7df247288a893d847b9cee734e1f0ef2a425ad1febb93d1c72eb70fd
-
SHA512
5c4629d31cfe2ebd498706c4fde7d3e2551e3e640ae05c2625da5bcda6b6cc49d5362c0dd1fe1b983e004c4203c93c749d3134d3748c79a3d2d2ae012eca8ebe
-
SSDEEP
6144:c5pOddz2Bs3VZuQLYbtwZdMPrHE28P5RfGnyEf:c5pOddz2BwbM2ZuPrHE1PPfGf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 172c73647c8daf062e6761612bf063ce_JaffaCakes118
Files
-
172c73647c8daf062e6761612bf063ce_JaffaCakes118.exe windows:5 windows x86 arch:x86
78e9dceedfe6a4fac3d22b7170777b12
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoW
GetLogicalDriveStringsW
GetModuleFileNameW
GetModuleHandleA
GetNumberFormatW
GetPrivateProfileStringW
GetProcessHeap
GetStartupInfoW
GetSystemDirectoryW
GetSystemTime
GetSystemTimeAsFileTime
GetTapeParameters
GetTapePosition
GetTapeStatus
GetTickCount
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetVersionExW
GetVolumeInformationW
GetVolumeNameForVolumeMountPointW
GetVolumePathNameW
GetWindowsDirectoryW
GlobalFree
HeapAlloc
HeapFree
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
LoadLibraryW
LoadResource
LocalFileTimeToFileTime
LocalFree
LockFile
GetLocalTime
MoveFileExW
MultiByteToWideChar
PrepareTape
QueryPerformanceCounter
ReadFile
ReleaseMutex
ReleaseSemaphore
RemoveDirectoryW
SetCurrentDirectoryW
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesW
SetFilePointer
SetFileShortNameW
SetFileTime
SetLastError
SetTapeParameters
SetTapePosition
SetUnhandledExceptionFilter
Sleep
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TerminateProcess
TerminateThread
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
WaitForSingleObject
WideCharToMultiByte
WriteFile
WritePrivateProfileStringW
WriteTapemark
GetLastError
GetFileSize
GetFileInformationByHandle
GetFileAttributesW
GetExitCodeThread
CreateFileW
GetEnvironmentVariableW
GetDriveTypeW
GetDiskFreeSpaceExW
GetDateFormatW
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryW
GetCurrentDirectoryA
GetComputerNameW
GetCompressedFileSizeW
FreeLibrary
FormatMessageW
FlushFileBuffers
FindVolumeMountPointClose
FindResourceW
FindNextVolumeMountPointW
FindNextFileW
FindFirstVolumeMountPointW
FindFirstFileW
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExpandEnvironmentStringsW
ExitThread
EraseTape
EnterCriticalSection
DeviceIoControl
DeleteFileW
DeleteCriticalSection
CreateThread
CreateSemaphoreW
CreateProcessW
CreateMutexW
CreateHardLinkW
CreateEventW
CreateDirectoryW
CompareStringW
CloseHandle
BackupWrite
BackupSeek
BackupRead
LoadLibraryExA
GetProcAddress
GetStartupInfoA
GetACP
LockResource
user32
LoadCursorA
LoadIconA
LoadIconW
LoadCursorW
advapi32
RegOpenKeyW
ReportEventW
RegisterEventSourceW
RegUnLoadKeyW
RegSetValueExW
RegSaveKeyW
RegRestoreKeyW
RegReplaceKeyW
RegQueryValueExW
RegQueryValueExA
RegOpenKeyExW
RegOpenKeyExA
RegLoadKeyW
RegFlushKey
RegEnumValueW
RegEnumKeyExW
RegDeleteValueW
RegCreateKeyExW
RegConnectRegistryW
RegCloseKey
ReadEncryptedFileRaw
QueryServiceStatus
OpenThreadToken
OpenServiceW
OpenSCManagerW
OpenProcessToken
OpenEncryptedFileRawW
LookupPrivilegeValueW
LookupAccountSidW
InitializeSecurityDescriptor
InitializeAcl
GetUserNameW
GetTokenInformation
GetSecurityDescriptorDacl
GetAce
FreeSid
EqualSid
EnumDependentServicesW
EncryptFileW
DeleteAce
DecryptFileW
ControlService
CloseServiceHandle
CloseEncryptedFileRaw
CheckTokenMembership
AllocateAndInitializeSid
AdjustTokenPrivileges
AddAccessAllowedAce
SetFileSecurityW
SetSecurityDescriptorDacl
StartServiceW
WriteEncryptedFileRaw
SetEntriesInAclW
msvcrt
_CxxThrowException
_XcptFilter
__CxxFrameHandler
__dllonexit
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
_adjust_fdiv
_c_exit
_cexit
_controlfp
_errno
_except_handler3
_exit
_fdopen
_filelength
_ftol
_getpid
_initterm
_local_unwind2
_mbscpy
_mbslen
_onexit
_open_osfhandle
_purecall
_putenv
_snwprintf
_tzset
_vsnwprintf
_wcmdln
_wcsdup
_wcsicmp
_wcslwr
_wcsnicmp
_wcsrev
_wcsupr
_wfopen
_wtoi
calloc
clearerr
exit
fclose
fflush
fread
free
fseek
ftell
fwrite
isalpha
isspace
localtime
malloc
memmove
mktime
realloc
swprintf
swscanf
time
wcscat
wcschr
wcscmp
wcscpy
wcslen
wcsncat
wcsncmp
wcsncpy
wcspbrk
wcsrchr
wcsstr
wcstok
wprintf
Sections
.text Size: 181KB - Virtual size: 180KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ