Static task
static1
Behavioral task
behavioral1
Sample
ed10494d2b025b0cbfcd4fa76cd94f99_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ed10494d2b025b0cbfcd4fa76cd94f99_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
ed10494d2b025b0cbfcd4fa76cd94f99_JaffaCakes118
-
Size
183KB
-
MD5
ed10494d2b025b0cbfcd4fa76cd94f99
-
SHA1
82c79f3ef1e2103fb27fe7edd03a10138f40f820
-
SHA256
f70ae6e6d7a0ca9167a18e642d290b3fa8c8f5682c6b2b4c21fe037820efb657
-
SHA512
c41a4fcfed6eb3216785f2364e7d3f4817d36e366e2571e741ebe9dba9b6e19fffb1b1d4c2bba6456ff6422a5082eb85195df5dfbfda33c4f4f7846735c045c9
-
SSDEEP
3072:fwIX337dS4BcZmJ8vcUMr2cfRUC+le8DZLFLMWzE0gylnbPheDiCkCDbm0ob:flHrUvZdcR2OKe8DtFLRE0gEeOCpob
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ed10494d2b025b0cbfcd4fa76cd94f99_JaffaCakes118
Files
-
ed10494d2b025b0cbfcd4fa76cd94f99_JaffaCakes118.exe windows:4 windows x86 arch:x86
1b999d0482dbbe39166b9db9a8bd08e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleFileNameA
GetModuleHandleA
lstrcpynA
GetCommandLineA
GetUserDefaultLangID
GetTickCount
CreateProcessA
CreateFileA
GetDiskFreeSpaceA
CreateThread
GetFileSize
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetWindowsDirectoryA
CreateDirectoryA
GetSystemDirectoryA
MultiByteToWideChar
GetVersionExA
CopyFileA
CreateEventA
SetEvent
RemoveDirectoryA
Sleep
SetFileAttributesA
lstrcpyA
lstrlenA
lstrcatA
MoveFileA
GetFullPathNameA
GetShortPathNameA
SearchPathA
GetTempPathA
GetTempFileNameA
GetFileAttributesA
CompareFileTime
SetFileTime
CloseHandle
FindFirstFileA
DeleteFileA
GlobalAlloc
FindNextFileA
lstrcmpiA
GetEnvironmentVariableA
ExpandEnvironmentStringsA
WaitForSingleObject
GetExitCodeProcess
LoadLibraryA
GetProcAddress
FreeLibrary
ExitProcess
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
MulDiv
GetCurrentThread
GetLastError
GetCurrentProcess
LocalAlloc
LocalFree
GlobalFree
SetEndOfFile
user32
GetParent
EnumChildWindows
SetClassLongA
GetDlgItem
GetWindowRect
ScreenToClient
SetWindowPos
EnableWindow
SetFocus
EndDialog
IsWindowEnabled
DialogBoxParamA
SetTimer
SetWindowTextA
SetDlgItemTextA
CharNextA
CreateDialogParamA
DestroyWindow
PostQuitMessage
ShowWindow
CharPrevA
wsprintfA
FindWindowExA
IsWindow
PeekMessageA
DispatchMessageA
ExitWindowsEx
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
SetRect
FillRect
GetWindowTextA
DrawTextA
EndPaint
LoadIconA
LoadCursorA
RegisterClassA
SystemParametersInfoA
GetDesktopWindow
GetDlgItemTextA
SendDlgItemMessageA
IsWindowVisible
SetForegroundWindow
LoadBitmapA
CreateWindowExA
MessageBoxA
gdi32
CreateBrushIndirect
GetNearestColor
SetBkColor
GetStockObject
CreatePen
MoveToEx
LineTo
GetTextColor
CreateCompatibleDC
BitBlt
GetObjectA
CreateFontIndirectA
CreateSolidBrush
DeleteObject
CreateFontA
SetBkMode
SetTextColor
SelectObject
advapi32
IsValidSecurityDescriptor
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyA
RegSetValueExA
RegQueryValueExA
RegEnumKeyA
RegEnumValueA
RegCloseKey
ImpersonateSelf
OpenThreadToken
OpenProcessToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
RevertToSelf
FreeSid
AccessCheck
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
SetSecurityDescriptorDacl
shell32
SHGetPathFromIDListA
SHGetMalloc
ShellExecuteA
SHFileOperationA
SHBrowseForFolderA
ole32
CoCreateInstance
OleUninitialize
OleInitialize
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
comctl32
ord17
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 97KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ