Static task
static1
Behavioral task
behavioral1
Sample
f0a0878abf29f007271dd3d090117c06_JaffaCakes118.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
f0a0878abf29f007271dd3d090117c06_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f0a0878abf29f007271dd3d090117c06_JaffaCakes118
-
Size
504KB
-
MD5
f0a0878abf29f007271dd3d090117c06
-
SHA1
7b036f310927a1644d834458ad312f8a87b93a7c
-
SHA256
9c55ba095ae225ace4ae6deefa47406523fb220f71b9b8b978efdf4371216a66
-
SHA512
c5eb77a9c1f3702f177d672a1cad88dd70dcb05ec4720fa5495a259a308e344ec28d02480a2404900e472342ac541379ab3489fb75bc7512849b1ce55d67b76d
-
SSDEEP
12288:aA3n7oqXcIGpm3owTk5gQDsj1oXrCDVI:aA3n7BXcOAgUsj1wKI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f0a0878abf29f007271dd3d090117c06_JaffaCakes118
Files
-
f0a0878abf29f007271dd3d090117c06_JaffaCakes118.exe windows:4 windows x86 arch:x86
082de0a162a527de2ed8c10d14279513
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
ChooseFontW
GetOpenFileNameA
shell32
SHGetFileInfoA
ExtractAssociatedIconExA
RealShellExecuteExA
advapi32
CryptGenRandom
CreateServiceA
DuplicateTokenEx
RegConnectRegistryW
RegLoadKeyA
RegOpenKeyExW
RegNotifyChangeKeyValue
RegSetKeySecurity
RegFlushKey
LookupAccountNameW
kernel32
VirtualFree
HeapAlloc
GetLocaleInfoW
GetStringTypeW
GetCommandLineA
EnumResourceLanguagesA
IsBadReadPtr
InterlockedExchange
VirtualQuery
GetCurrentThreadId
FindFirstFileExW
LCMapStringW
GetLogicalDrives
GetTickCount
SetFilePointer
LCMapStringA
Sleep
EnumResourceTypesA
GetStringTypeA
GetLastError
HeapReAlloc
GetConsoleOutputCP
FreeEnvironmentStringsW
GetModuleFileNameA
GetStdHandle
GetOEMCP
HeapCreate
TlsFree
CloseHandle
DeleteCriticalSection
LeaveCriticalSection
SetEnvironmentVariableA
GetUserDefaultLCID
GetVersionExA
ExitProcess
OpenSemaphoreW
SetConsoleCtrlHandler
TlsSetValue
GetProcessHeap
EnumDateFormatsExA
GetCurrentThread
GetCurrentProcessId
GetCommandLineW
TlsAlloc
GetTimeFormatA
GetComputerNameA
SetPriorityClass
lstrcpyA
RtlUnwind
GetDateFormatA
GetEnvironmentStringsW
UnhandledExceptionFilter
SetLastError
GetProcAddress
GetACP
HeapDestroy
GetTimeZoneInformation
HeapSize
GetConsoleMode
CommConfigDialogW
VirtualAlloc
SetHandleCount
IsValidCodePage
GetFileType
LoadLibraryA
GetSystemTimeAsFileTime
GetCurrentProcess
GetConsoleCP
GetEnvironmentStrings
GetCPInfo
TerminateProcess
FreeLibrary
GetFileAttributesExW
WriteConsoleW
CreateFileA
GetExitCodeThread
SetStdHandle
GetLocaleInfoA
MultiByteToWideChar
ReadFile
TlsGetValue
GetStartupInfoA
CreateMutexA
SetFileTime
QueryPerformanceCounter
WriteConsoleA
WriteFile
InitializeCriticalSection
CompareStringA
EnumSystemLocalesA
GlobalReAlloc
InterlockedDecrement
EnterCriticalSection
FreeEnvironmentStringsA
IsDebuggerPresent
IsValidLocale
GetPrivateProfileSectionNamesA
FlushFileBuffers
InterlockedIncrement
GlobalCompact
HeapFree
CompareStringW
WideCharToMultiByte
GetLongPathNameA
GetModuleHandleA
SetUnhandledExceptionFilter
OpenMutexA
gdi32
GetICMProfileA
GetDIBits
SetGraphicsMode
CreateColorSpaceA
GetStretchBltMode
CreateDiscardableBitmap
SetMapperFlags
GetCharWidth32W
GetROP2
SetAbortProc
GetColorAdjustment
comctl32
InitCommonControlsEx
user32
GetMenuItemRect
SetDoubleClickTime
WindowFromPoint
GetClassNameW
RegisterClassExA
DdeQueryNextServer
RemovePropA
DdeConnect
RegisterClassA
MsgWaitForMultipleObjects
FindWindowW
GetKeyboardLayoutList
EnumDisplaySettingsA
LoadMenuIndirectW
RegisterClassW
DdeAccessData
SetForegroundWindow
GetWindowTextW
CopyIcon
Sections
.text Size: 344KB - Virtual size: 344KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ