Static task
static1
Behavioral task
behavioral1
Sample
1771b607c2ccc1ef7c937553d235ef4f_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1771b607c2ccc1ef7c937553d235ef4f_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1771b607c2ccc1ef7c937553d235ef4f_JaffaCakes118
-
Size
332KB
-
MD5
1771b607c2ccc1ef7c937553d235ef4f
-
SHA1
80c5de67e55c8846ad3de519c27be6ebe750e889
-
SHA256
6592f72158146c757c839465f82ff743d031962b688d3818acb6943ae2957224
-
SHA512
5832b88e4135ae879aad90f97d29e945400dd33d0f6521ffb597ad59c06bbc9862020767c2acd062d7a187f454350ff7f99725f2fcc18b20c91ef513d7c37fd0
-
SSDEEP
6144:GVhCM5ngTuV6righfSGuob5/UNC9ivI+wAI6jxl4C1:1M5ngTuVmiOWCL5AISQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1771b607c2ccc1ef7c937553d235ef4f_JaffaCakes118
Files
-
1771b607c2ccc1ef7c937553d235ef4f_JaffaCakes118.exe windows:4 windows x86 arch:x86
1961804a5ac7506cca1260965cd58f58
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathAppendA
PathStripToRootA
kernel32
GetProcAddress
LoadLibraryA
TerminateProcess
OpenProcess
Sleep
SetCurrentDirectoryA
GetCurrentDirectoryA
GetCurrentProcessId
GetModuleFileNameA
GetTempPathA
FindClose
FindNextFileA
RemoveDirectoryA
SetFileAttributesA
FindFirstFileA
LocalFree
GetVersionExA
GetCurrentProcess
GetCurrentThread
CreateDirectoryA
MoveFileA
FreeLibrary
SetThreadPriority
SetPriorityClass
lstrcatA
lstrcpyA
GetEnvironmentVariableA
GetShortPathNameA
HeapSize
LCMapStringW
LCMapStringA
SetEndOfFile
GetSystemTimeAsFileTime
GetTickCount
QueryPerformanceCounter
GetOEMCP
GetACP
CreateToolhelp32Snapshot
Process32First
Process32Next
CreateProcessA
GetLastError
CloseHandle
FindResourceA
SizeofResource
LoadResource
LockResource
GetSystemDirectoryA
GetWindowsDirectoryA
GetFileAttributesA
GetCPInfo
ResumeThread
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
CreateFileA
HeapFree
HeapAlloc
DeleteFileA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
WriteFile
TlsAlloc
SetLastError
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
ReadFile
ExitProcess
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
SetFilePointer
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
SetStdHandle
FlushFileBuffers
MultiByteToWideChar
VirtualProtect
GetSystemInfo
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
user32
GetMessageA
SetForegroundWindow
ShowWindow
DefWindowProcA
PostQuitMessage
PostMessageA
wsprintfA
RegisterClassExA
DispatchMessageA
CreateWindowExA
FindWindowA
IsIconic
advapi32
SetNamedSecurityInfoA
OpenThreadToken
OpenProcessToken
GetTokenInformation
EqualSid
AllocateAndInitializeSid
GetNamedSecurityInfoA
SetEntriesInAclA
FreeSid
RegDeleteValueA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegCreateKeyExA
RegSetValueExA
RegCloseKey
ole32
OleInitialize
OleUninitialize
StringFromGUID2
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 236KB - Virtual size: 233KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ