Static task
static1
Behavioral task
behavioral1
Sample
e852342b3b94a1265de4277aad274985_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e852342b3b94a1265de4277aad274985_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e852342b3b94a1265de4277aad274985_JaffaCakes118
-
Size
172KB
-
MD5
e852342b3b94a1265de4277aad274985
-
SHA1
6438f9f18dc7c9b89739a820e5aab54d047945b9
-
SHA256
e2579b3d89a8b63adebd87c8ceeb1396ae6c9d9f7c45030bf032d6e5ced77dc5
-
SHA512
b8f587476f96c0275ee236dd476817d9ad56f7c7662b80ee529f35c528c6e1fe9c22d4be100cc56bde56f24ccc2a4005e01d9ef75f7ee44072fa079fc2959c4f
-
SSDEEP
3072:+Mjq3j4hLZz4ZArtVW8iN5SVG/wpuohKYxeD7AgJ/oB0J:pqzALZzLrW8iNubpuoKY27Ah0J
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e852342b3b94a1265de4277aad274985_JaffaCakes118
Files
-
e852342b3b94a1265de4277aad274985_JaffaCakes118.exe windows:4 windows x86 arch:x86
cade3324eb7d9bbb976a6a362a612017
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
LocalFree
FormatMessageA
CreateProcessA
CreateFileA
GetLastError
CreateMutexA
GetTempPathA
GetModuleFileNameA
lstrcatA
WritePrivateProfileSectionA
GetPrivateProfileSectionA
lstrcmpA
GetWindowsDirectoryA
MoveFileExA
GetVersionExA
CopyFileA
DeleteFileA
GetFileAttributesA
CreateDirectoryA
MultiByteToWideChar
WriteFile
GetTempFileNameA
SetFilePointer
FindClose
WaitForSingleObject
FindFirstFileA
GetCurrentDirectoryA
GetFullPathNameA
RaiseException
GetDriveTypeA
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedExchange
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetTimeZoneInformation
FlushFileBuffers
SetStdHandle
LoadLibraryA
IsBadCodePtr
IsBadReadPtr
CloseHandle
GetCurrentProcess
ReadFile
GetModuleHandleA
GetProcAddress
GetSystemInfo
GetVersion
GetCommandLineA
lstrlenA
GetProcessHeap
HeapAlloc
MoveFileA
lstrcpyA
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
IsBadWritePtr
VirtualAlloc
RtlUnwind
InterlockedDecrement
InterlockedIncrement
HeapFree
GetStartupInfoA
ExitProcess
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
TerminateProcess
HeapReAlloc
HeapSize
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCPInfo
GetACP
GetOEMCP
WideCharToMultiByte
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sleep
HeapDestroy
HeapCreate
VirtualFree
user32
GetWindowRect
GetDlgItem
ShowWindow
SetDlgItemTextA
EndDialog
SetWindowPos
ExitWindowsEx
DialogBoxParamA
LoadStringA
SendMessageA
InvalidateRect
CreateDialogParamA
MessageBoxA
DestroyWindow
FindWindowA
GetWindowThreadProcessId
PostMessageA
GetSystemMetrics
IsDlgButtonChecked
GetDlgItemTextA
CheckDlgButton
GetDlgCtrlID
gdi32
GetStockObject
SetBkColor
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegDeleteValueA
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderLocation
SHGetMalloc
ole32
CoCreateInstance
CoInitialize
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
Sections
.text Size: 84KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ