Static task
static1
Behavioral task
behavioral1
Sample
334ad96ae1886b6494d8c4b039cc4154_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
334ad96ae1886b6494d8c4b039cc4154_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
334ad96ae1886b6494d8c4b039cc4154_JaffaCakes118
-
Size
192KB
-
MD5
334ad96ae1886b6494d8c4b039cc4154
-
SHA1
ceb3563bdd7f7d5ab922856303d9d8b61925d92c
-
SHA256
7e2e08161a82564ca386c4605d384e5976cf1d24b74e88a5bb3d0bd225d9c346
-
SHA512
0ef231d5271fe40ba0ed1add4417597d74b2762208eccdfa23438398675921bd799956bb9a4e44f6ee408d5b53726e6de5713e544cd91e57e48aacaf0c133fdc
-
SSDEEP
3072:/NApvAr2NqUwPDQRzueV7HerHcFyO7p+2R02LinpTXqo7nmzZMiZzG:/NApo6NdwP0Aue4UOdzpihXom
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 334ad96ae1886b6494d8c4b039cc4154_JaffaCakes118
Files
-
334ad96ae1886b6494d8c4b039cc4154_JaffaCakes118.exe windows:5 windows x86 arch:x86
246ada175bef50b5ffde46fcb30e27e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
lstrcpyA
lstrlenW
MultiByteToWideChar
AreFileApisANSI
GetModuleHandleA
GetStartupInfoA
GetLastError
lstrlenA
CloseHandle
CreateMutexA
SetLastError
GetFileAttributesA
LocalFree
GetProcAddress
GetModuleFileNameA
lstrcpynA
LoadLibraryA
GetTickCount
GetProcessHeap
ActivateActCtx
GlobalFindAtomA
GetACP
OpenWaitableTimerA
OpenWaitableTimerW
GetOEMCP
CancelIo
GetFullPathNameA
GetVersion
GetCurrentThreadId
FreeLibrary
WideCharToMultiByte
VirtualProtect
user32
GetForegroundWindow
GetKeyboardLayout
IsWindowUnicode
GetDesktopWindow
IsZoomed
GetDlgCtrlID
EnableWindow
UpdateWindow
SetRect
ReleaseCapture
SetCapture
wsprintfW
SendMessageA
GetWindowRect
EnumChildWindows
DefWindowProcA
GrayStringA
GetParent
PtInRect
IsWindow
FillRect
GetSystemMetrics
GetWindowTextA
GetSystemMenu
SetForegroundWindow
IsWindowEnabled
CharUpperA
GetTopWindow
SetWindowTextA
TabbedTextOutA
DrawTextA
OffsetRect
gdi32
CreateFontIndirectA
LPtoDP
CreatePalette
SetPixel
Polyline
GetTextColor
BitBlt
PtVisible
PtInRegion
TextOutA
DPtoLP
CreatePolygonRgn
SetRectRgn
CombineRgn
RectVisible
CreateRectRgn
GetObjectA
advapi32
CryptHashData
CryptAcquireContextA
CryptDestroyKey
CryptDecrypt
RegOpenKeyExA
RegDeleteValueW
RegCreateKeyExA
FreeSid
IsTextUnicode
CryptCreateHash
LsaFreeMemory
RegCloseKey
RegSetValueExW
RegOpenCurrentUser
LsaOpenPolicy
RegEnumValueW
RegDeleteKeyW
RegOpenKeyExW
RegCreateKeyExW
RegEnumKeyW
RegQueryValueExW
LsaClose
CryptDestroyHash
CryptReleaseContext
EqualSid
RegDeleteValueA
CryptDeriveKey
RegEnumValueA
RegSetValueExA
RegQueryValueExA
CryptEncrypt
RegOpenKeyA
shell32
ShellExecuteA
SHGetMalloc
SHGetDesktopFolder
SHGetPathFromIDListA
ole32
CoUninitialize
CoCreateInstance
StringFromCLSID
CoTaskMemFree
CoInitialize
CLSIDFromProgID
comctl32
_TrackMouseEvent
InitCommonControlsEx
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
oledlg
ord8
OleUIBusyW
msvcrt
_adjust_fdiv
_controlfp
_CIcos
exit
free
_vsnprintf
_strdup
_initterm
_mbscmp
__getmainargs
_splitpath
_acmdln
__dllonexit
_onexit
_except_handler3
__setusermatherr
__CxxFrameHandler
_exit
??1type_info@@UAE@XZ
_setmbcp
_mbsicmp
_CxxThrowException
_XcptFilter
?terminate@@YAXXZ
__p__commode
__p__fmode
__set_app_type
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ydata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss1 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ