Static task
static1
Behavioral task
behavioral1
Sample
5db89543f226fdde1e5932a7b0b09a89_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5db89543f226fdde1e5932a7b0b09a89_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
5db89543f226fdde1e5932a7b0b09a89_JaffaCakes118
-
Size
496KB
-
MD5
5db89543f226fdde1e5932a7b0b09a89
-
SHA1
f941c525a09f7a2bfb28e661085393ead939dcf6
-
SHA256
6fefe7dbdc8eaeed3992ac6aaf395c07ff1de0b75148ec34d9873b7f1a38e5c1
-
SHA512
08485e5e3d56b543f6b0ceea605eaf3ef9d36537a3fcbc9a721cdaf759772deecc356f2e4e2ad98b238d1ec771c0e119ec1d703af195a7b6d9167c1f917c247a
-
SSDEEP
12288:ydR9I4o1+tPdE3X0AZpnFkNQucwP7ckiO8K1Fy1H4AJyGB53F:m90EBdxDcM1Qr53F
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5db89543f226fdde1e5932a7b0b09a89_JaffaCakes118
Files
-
5db89543f226fdde1e5932a7b0b09a89_JaffaCakes118.exe windows:4 windows x86 arch:x86
cb7f492a68bfd69c665e7a0db6a8b730
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDBCSLeadByte
GlobalDeleteAtom
GlobalAddAtomA
CreateProcessA
GetShortPathNameA
WriteProfileStringA
lstrcpyA
CopyFileA
SystemTimeToFileTime
GetFileTime
GetExitCodeProcess
SetFileAttributesA
GetFileAttributesA
FileTimeToSystemTime
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
FreeLibrary
GetProcAddress
LoadLibraryA
GetModuleFileNameA
GetCurrentThreadId
GetUserDefaultLangID
GetVersionExA
GetModuleHandleA
GetSystemDirectoryA
SearchPathA
GetEnvironmentVariableA
GetWindowsDirectoryA
GetCurrentDirectoryA
CreateDirectoryA
DeleteFileA
FindResourceA
SizeofResource
LoadResource
LockResource
FreeResource
GetStartupInfoA
MultiByteToWideChar
lstrcmpA
lstrlenA
lstrcpynA
SetFileTime
FlushFileBuffers
SetLastError
CloseHandle
LocalAlloc
CreateFileA
LocalFree
GetFileSize
ReadFile
SetFilePointer
GetLastError
GetVolumeInformationA
WriteFile
user32
SetFocus
CheckDlgButton
KillTimer
EndPaint
DrawIcon
BeginPaint
IsIconic
DestroyIcon
UnhookWindowsHookEx
SetWindowsHookExA
GetClassInfoA
GetSystemMetrics
SendDlgItemMessageA
SetTimer
CharNextA
GetDesktopWindow
GetWindowRect
GetDlgItem
EnableWindow
PackDDElParam
FreeDDElParam
GetDlgItemTextA
MoveWindow
PostMessageA
FindWindowA
WaitForInputIdle
SendMessageA
LoadIconA
SetWindowTextA
CharUpperA
SetDlgItemTextA
PeekMessageA
IsDialogMessageA
DispatchMessageA
wsprintfA
CharLowerA
CharPrevA
EndDialog
MessageBoxA
GetWindowLongA
CallNextHookEx
DialogBoxIndirectParamA
SystemParametersInfoA
TranslateMessage
gdi32
SetMapMode
GetMapMode
comdlg32
GetOpenFileNameA
GetFileTitleA
advapi32
RegOpenKeyA
RegCreateKeyA
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegQueryValueA
RegSetValueExA
RegCreateKeyExA
RegSetValueA
shell32
ShellExecuteA
crtdll
strchr
_global_unwind2
memcpy
exit
_local_unwind2
strrchr
atoi
memset
_exit
_XcptFilter
_acmdln_dll
_initterm
__GetMainArgs
_commode_dll
_fmode_dll
Sections
.text Size: 25KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 469B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 8B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ