Static task
static1
Behavioral task
behavioral1
Sample
17d4d1898ad9f93e96baf0821cab4644_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
17d4d1898ad9f93e96baf0821cab4644_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
17d4d1898ad9f93e96baf0821cab4644_JaffaCakes118
-
Size
243KB
-
MD5
17d4d1898ad9f93e96baf0821cab4644
-
SHA1
79f01b0c55ebb62a2310969c1288a9b1106a1a96
-
SHA256
cee778e99a406b7d060330ae84e62cb8ec5a5fe1e729156fb92d873f7f679a2b
-
SHA512
80a10fa0e11611bf24fa6ab653c0eb24f71354424de746159e500125109da815de5d9f3243eae8ec4ae945f9f98cebfa9a0ced05251ba75eb9493eb9134c8369
-
SSDEEP
3072:nlH3A3RLKepuNRabAl1UZ3mFg6+5+LL81cg:nlMRLKxagJB3Scg
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17d4d1898ad9f93e96baf0821cab4644_JaffaCakes118
Files
-
17d4d1898ad9f93e96baf0821cab4644_JaffaCakes118.exe windows:5 windows x86 arch:x86
14e362532d47b6c675081897dd0b93c6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsA
AssocQueryStringA
wnsprintfA
StrNCatA
SHDeleteKeyA
StrToIntA
StrStrIA
userenv
GetProfilesDirectoryA
kernel32
lstrcpyA
RemoveDirectoryA
MoveFileExA
DeleteFileA
lstrcmpiA
CreateProcessA
WriteFile
ReadFile
GetFileSize
CreateFileA
GetTempPathA
GetModuleFileNameA
SetEndOfFile
SetFilePointer
GetVersionExA
Sleep
GetModuleHandleA
GetVolumeInformationA
CreateThread
GetTickCount
ExitProcess
SetErrorMode
SetLastError
GetSystemTimeAsFileTime
lstrcatA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
HeapSize
GetConsoleMode
GetConsoleCP
HeapReAlloc
VirtualAlloc
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcessId
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
lstrlenA
FindFirstFileA
GetFileAttributesA
FindNextFileA
FindClose
MultiByteToWideChar
lstrcmpA
ExpandEnvironmentStringsA
HeapFree
LocalFree
GetCurrentProcess
GetProcessHeap
HeapAlloc
OpenProcess
LoadLibraryA
GetProcAddress
FreeLibrary
CloseHandle
lstrcpynA
GetLastError
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
FreeEnvironmentStringsA
GetStdHandle
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InterlockedDecrement
GetCurrentThreadId
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
RaiseException
RtlUnwind
GetCommandLineA
GetStartupInfoA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualQuery
user32
SystemParametersInfoA
AdjustWindowRectEx
GetMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
DefWindowProcA
SendDlgItemMessageA
GetDlgItem
RegisterClassExA
GetWindowRect
SetWindowPos
SetWindowTextA
SendMessageA
DestroyWindow
BeginPaint
FillRect
EndPaint
PostQuitMessage
GetWindowLongA
LoadBitmapA
CreateWindowExA
ShowWindow
ExitWindowsEx
GetUserObjectSecurity
GetShellWindow
GetWindowThreadProcessId
MessageBoxA
LoadIconA
LoadCursorA
UpdateWindow
gdi32
CreateSolidBrush
SetBkMode
SetTextColor
CreateCompatibleDC
SelectObject
GetObjectA
BitBlt
DeleteDC
CreateFontA
GetTextExtentPoint32A
TextOutA
GetStockObject
advapi32
RegEnumKeyA
RegQueryInfoKeyA
RegEnumValueA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyA
RegSetValueExA
ConvertSidToStringSidA
GetUserNameA
GetSecurityDescriptorOwner
IsValidSid
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
shell32
SHFileOperationA
ShellExecuteA
SHGetFolderPathA
ord680
ShellExecuteExA
ole32
CoInitialize
CoCreateInstance
CoUninitialize
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 148KB - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ