Static task
static1
Behavioral task
behavioral1
Sample
8ab71e1a19ad7cb1e79fb8b1bc3cab97_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8ab71e1a19ad7cb1e79fb8b1bc3cab97_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8ab71e1a19ad7cb1e79fb8b1bc3cab97_JaffaCakes118
-
Size
313KB
-
MD5
8ab71e1a19ad7cb1e79fb8b1bc3cab97
-
SHA1
711473b4cfa62d4d0243c598ef47ce4c481c274d
-
SHA256
b65f63f75a0b88ac2fb0612cf8e2298447e2080b67a2d016b5e6e50c61f1d517
-
SHA512
5cda8dd5de270e3400f21e903b4031d33bcc095b7ace742b7b48cb183692986968022e9cd32463f2390b10c6facca9ae74d16b965b28741a7933930ca343cafb
-
SSDEEP
6144:N7S6tMIBchObFAYh3qqMx9HELXNKQ5m6Rvx:N7SqMIBIIFzQqVbNK9ovx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8ab71e1a19ad7cb1e79fb8b1bc3cab97_JaffaCakes118
Files
-
8ab71e1a19ad7cb1e79fb8b1bc3cab97_JaffaCakes118.exe windows:5 windows x86 arch:x86
a75348a88f58191cfc634bdc8179ca61
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CompareStringW
CompareStringA
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
InitializeCriticalSectionAndSpinCount
HeapSize
GetConsoleMode
GetConsoleCP
SetFilePointer
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
GetModuleFileNameA
ExitProcess
HeapReAlloc
VirtualAlloc
VirtualFree
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
LeaveCriticalSection
EnterCriticalSection
GetTimeZoneInformation
GetCurrentThreadId
SetLastError
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
GetModuleHandleW
IsValidCodePage
FindResourceExA
GetProfileIntA
GetProfileStringA
CreateEventA
WaitForSingleObject
HeapCreate
GetProcAddress
HeapAlloc
InterlockedExchange
SetConsoleCtrlHandler
GlobalLock
lstrlenA
GlobalUnlock
EnumSystemLocalesA
MultiByteToWideChar
GetLastError
WideCharToMultiByte
CreateToolhelp32Snapshot
LoadLibraryA
Thread32First
CloseHandle
Thread32Next
lstrcpyA
IsProcessorFeaturePresent
GetSystemInfo
Sleep
CreateMutexA
CreateFileA
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
HeapFree
GetStartupInfoA
GetCommandLineA
RtlUnwind
GetFileSize
GetModuleHandleA
WriteFile
RaiseException
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
SetEnvironmentVariableA
user32
DefWindowProcA
GetClientRect
GetWindowRect
GetSystemMetrics
LoadCursorA
LoadAcceleratorsA
RegisterClassA
EnumDisplayDevicesA
SetDlgItemTextW
InsertMenuA
SetForegroundWindow
GetMessagePos
AppendMenuW
CreatePopupMenu
LoadStringW
GetMenuCheckMarkDimensions
DrawFrameControl
GetWindow
ClientToScreen
GetSysColor
FillRect
SetWindowTextA
BeginPaint
wsprintfA
EndPaint
CreateMenu
SetMenu
SetCapture
InvalidateRect
ReleaseCapture
GetCursorPos
TrackPopupMenu
DestroyMenu
GetCapture
ChangeClipboardChain
SetClipboardViewer
GetSubMenu
MoveWindow
GetForegroundWindow
GetWindowThreadProcessId
AttachThreadInput
BringWindowToTop
IsClipboardFormatAvailable
OpenClipboard
GetClipboardData
CloseClipboard
GetDC
ReleaseDC
CreateWindowExA
SetDlgItemTextA
FindWindowW
ShowWindow
gdi32
CreateRoundRectRgn
DeleteObject
GetObjectA
BitBlt
GetNearestPaletteIndex
ExtTextOutA
SetBkMode
CreateFontIndirectA
SetTextAlign
SetTextColor
CreateDIBSection
CreateCompatibleDC
DeleteDC
ChoosePixelFormat
DescribePixelFormat
SetPixelFormat
GetStockObject
SelectObject
GetTextMetricsA
CreateSolidBrush
advapi32
CreateTraceInstanceId
RegNotifyChangeKeyValue
RegOpenKeyExA
ConvertToAutoInheritPrivateObjectSecurity
RegCloseKey
RegQueryValueExA
ole32
CoCreateInstance
CoInitialize
CoInitializeEx
wininet
InternetGetLastResponseInfoA
InternetOpenA
InternetConnectA
FtpOpenFileA
comctl32
CreatePropertySheetPageA
DestroyPropertySheetPage
pdh
PdhAddCounterA
PdhCollectQueryData
PdhOpenQueryA
PdhMakeCounterPathA
traffic
TcSetInterface
wlanapi
WlanEnumInterfaces
WlanOpenHandle
Sections
.text Size: 95KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 184KB - Virtual size: 183KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ