Static task
static1
Behavioral task
behavioral1
Sample
f875ad13d73eae5f415d81176765413f_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f875ad13d73eae5f415d81176765413f_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f875ad13d73eae5f415d81176765413f_JaffaCakes118
-
Size
4.1MB
-
MD5
f875ad13d73eae5f415d81176765413f
-
SHA1
0b37aba2e89c72fd615465c5dbcd5d90f7a2966e
-
SHA256
a8602cbbb650f6910b0ef34e838edd4ed57f8b67f1dd2b281299d54cdaf97964
-
SHA512
2fa89d548cb5237ece27c1c548cd70f57f165e3b9feabfe1b55d584dd37ef88f91c6d7b174904835e676288ce88fe5014515df43b485dfda1049f00eddd06eff
-
SSDEEP
49152:8jKvmFfyIm1FbEyq59OqL9YQfKMSLc0KOhimy1d9bGkn9o+cFtZsmRzUiRu0pIoR:vmFe1FbEycZ9fcyOPKdRFY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f875ad13d73eae5f415d81176765413f_JaffaCakes118
Files
-
f875ad13d73eae5f415d81176765413f_JaffaCakes118.exe windows:5 windows
ed20b287a9dc9eea5f9198e5723533c8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
ImageList_SetImageCount
ImageList_SetBkColor
ImageList_GetBkColor
ImageList_Draw
ImageList_DrawEx
ImageList_Remove
ImageList_EndDrag
ImageList_DragLeave
ImageList_DragMove
ImageList_Read
ImageList_GetIconSize
CreateToolbarEx
CreateStatusWindowW
FlatSB_SetScrollPos
FlatSB_SetScrollInfo
user32
InflateRect
DispatchMessageW
IsZoomed
GetFocus
CreateMenu
SetScrollRange
EnableScrollBar
LoadIconW
GetWindowLongW
PtInRect
RemovePropW
ScreenToClient
MessageBeep
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
shell32
ShellExecuteW
SHGetFileInfoW
SHGetMalloc
SHGetPathFromIDListW
SHCreateDirectoryExW
SHGetSpecialFolderLocation
SHBrowseForFolderW
SHGetDesktopFolder
SHChangeNotify
DragQueryFileW
shlwapi
PathIsUNCServerW
PathIsNetworkPathW
PathIsUNCW
PathIsRootW
PathIsRelativeW
PathIsDirectoryW
PathGetDriveNumberW
PathFindNextComponentW
PathFindExtensionW
PathIsURLW
PathCombineW
PathCanonicalizeW
PathBuildRootW
StrRetToBufW
StrRetToStrW
StrToIntExW
StrToIntW
StrRChrW
StrChrW
PathParseIconLocationW
PathRemoveBlanksW
PathRemoveExtensionW
PathRemoveFileSpecW
PathStripToRootW
SHDeleteEmptyKeyW
UrlCanonicalizeW
UrlEscapeW
SHDeleteKeyW
SHSetValueW
PathFileExistsW
kernel32
DeleteCriticalSection
GlobalFree
RtlUnwind
VirtualAlloc
ExitProcess
GetLastError
EnterCriticalSection
LeaveCriticalSection
GetStdHandle
SystemTimeToFileTime
FileTimeToLocalFileTime
CreateFileMappingW
LoadLibraryExW
GetModuleFileNameW
GetSystemDirectoryW
GetCPInfo
LCMapStringW
GetLocaleInfoW
GetConsoleMode
FreeConsole
WriteConsoleW
LocalFree
oleaut32
VarBstrFromDate
VarR8FromStr
VariantChangeTypeEx
VariantCopy
SafeArrayPtrOfIndex
VarNot
SafeArrayAccessData
SafeArrayGetLBound
SafeArrayCreate
SysFreeString
GetErrorInfo
SafeArrayUnaccessData
wintrust
CryptCATAdminReleaseCatalogContext
CryptCATAdminEnumCatalogFromHash
CryptCATAdminCalcHashFromFileHandle
CryptCATCatalogInfoFromContext
CryptCATAdminReleaseContext
setupapi
SetupDiBuildDriverInfoList
SetupDiGetDeviceInterfaceDetailW
SetupDiGetDeviceInstanceIdW
SetupDiEnumDriverInfoW
SetupCloseFileQueue
SetupCloseInfFile
SetupFindFirstLineW
SetupGetStringFieldW
SetupDiGetClassDevsExW
SetupDiCallClassInstaller
SetupDiGetDeviceRegistryPropertyW
SetupDiSetDeviceInstallParamsW
SetupDiGetActualSectionToInstallW
SetupDiGetDriverInfoDetailW
CM_Get_DevNode_Registry_Property_ExW
CM_Get_DevNode_Status
CM_Get_Parent
CM_Locate_DevNodeW
SetupDiCreateDeviceInfoListExW
SetupOpenFileQueue
comdlg32
CommDlgExtendedError
PrintDlgExW
FindTextW
ChooseColorW
GetFileTitleW
Sections
.text Size: 955KB - Virtual size: 954KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 538KB - Virtual size: 91.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aeeei Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ