Static task
static1
Behavioral task
behavioral1
Sample
2a35e1aa797833fe6300fae23f2916d8_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2a35e1aa797833fe6300fae23f2916d8_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2a35e1aa797833fe6300fae23f2916d8_JaffaCakes118
-
Size
151KB
-
MD5
2a35e1aa797833fe6300fae23f2916d8
-
SHA1
e2e99c23815dd1ab342dcee60d7cfbda8a7d6508
-
SHA256
362f165774c8d28f366d63a6907f3eba091279ede8cd5427d0ad9c315e2b902f
-
SHA512
f34abba30a242f348c7b271fa7241c0a9a9897226931c209d065e4699b273265a27e0f258ff0a62bc0dfab1a6b829b1f6da4881ce130c69618dd85c817b2e05d
-
SSDEEP
3072:puWmqVW6dAEqshM7Du76pgTqhlkZ+rWVfzPKdfRnANwZ:puWmR6deVPpgGAZ8gzPKdpANA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2a35e1aa797833fe6300fae23f2916d8_JaffaCakes118
Files
-
2a35e1aa797833fe6300fae23f2916d8_JaffaCakes118.exe windows:4 windows x86 arch:x86
a53a53db630e76990af549938f184131
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WaitForSingleObject
ReleaseMutex
GetModuleFileNameA
DefineDosDeviceA
MoveFileExA
SetFileAttributesA
GlobalMemoryStatusEx
GetDiskFreeSpaceExA
GlobalFree
GetProcessHeap
HeapAlloc
HeapFree
GetLocalTime
MoveFileA
OpenProcess
GetStartupInfoA
WriteProcessMemory
CreateRemoteThread
GetCurrentProcess
CreateProcessA
SetLastError
GetLastError
GetProcAddress
ReadFile
WriteFile
RemoveDirectoryA
GetDriveTypeA
CreateDirectoryA
GetVersionExA
lstrcmpA
WideCharToMultiByte
CreateMutexA
ExitProcess
SetErrorMode
OpenEventA
CloseHandle
VirtualAllocEx
GetTickCount
MultiByteToWideChar
lstrcatA
GetPrivateProfileSectionNamesA
lstrlenA
InterlockedExchange
SetEvent
lstrcpyA
ResetEvent
Sleep
CreateEventA
VirtualAlloc
LoadLibraryA
GetModuleHandleA
user32
GetKeyState
SetCapture
WindowFromPoint
SetCursorPos
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
GetSystemMetrics
GetAsyncKeyState
ReleaseDC
SetRect
GetCursorPos
wsprintfA
SetProcessWindowStation
OpenWindowStationA
GetProcessWindowStation
GetWindowThreadProcessId
IsWindowVisible
CloseDesktop
GetThreadDesktop
IsWindow
CharNextA
GetWindowTextA
GetForegroundWindow
LoadCursorA
SendMessageA
CloseWindow
CreateWindowExA
PostMessageA
OpenDesktopA
gdi32
CreateDIBSection
SelectObject
BitBlt
CreateCompatibleBitmap
GetDIBits
DeleteObject
DeleteDC
advapi32
RegCreateKeyExA
OpenServiceA
QueryServiceStatus
ControlService
DeleteService
CloseServiceHandle
RegQueryValueA
RegCloseKey
LsaOpenPolicy
LsaRetrievePrivateData
LsaClose
LookupAccountNameA
IsValidSid
RegSetValueExA
RegCreateKeyA
SetNamedSecurityInfoA
BuildExplicitAccessWithNameA
GetNamedSecurityInfoA
SetEntriesInAclA
RegQueryValueExA
RegOpenKeyA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
AddAccessAllowedAce
InitializeAcl
GetLengthSid
AllocateAndInitializeSid
RegEnumValueA
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
CreateProcessAsUserA
SetTokenInformation
DuplicateTokenEx
LookupAccountSidA
GetTokenInformation
OpenSCManagerA
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
shlwapi
SHDeleteKeyA
msvcrt
_strnicmp
_beginthreadex
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
calloc
_strupr
strncat
strtok
_errno
atoi
strncmp
strcat
rename
strrchr
_except_handler3
free
??3@YAXPAX@Z
__CxxFrameHandler
_CxxThrowException
memcpy
memmove
ceil
_ftol
strlen
strstr
memset
??2@YAPAXI@Z
strcpy
strchr
malloc
strcmp
ws2_32
inet_ntoa
inet_addr
getsockname
bind
getpeername
accept
listen
sendto
recvfrom
__WSAFDIsSet
send
closesocket
recv
ntohs
gethostbyname
htons
WSAStartup
WSACleanup
WSAIoctl
setsockopt
gethostname
select
connect
socket
msvcp60
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
wtsapi32
WTSFreeMemory
WTSQueryUserToken
WTSQuerySessionInformationA
userenv
CreateEnvironmentBlock
psapi
EnumProcessModules
Sections
.text Size: 118KB - Virtual size: 117KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ