Static task
static1
Behavioral task
behavioral1
Sample
6927f901f72a2469955243024e6d6595_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6927f901f72a2469955243024e6d6595_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
6927f901f72a2469955243024e6d6595_JaffaCakes118
-
Size
186KB
-
MD5
6927f901f72a2469955243024e6d6595
-
SHA1
0d8d7af0197374a91b31717391dd4c6be4904045
-
SHA256
14386303269bf30fd40967b8dbb39e43a4a43dbf844d95a22286e852dbceca29
-
SHA512
2ec103e6132a4eb84ed4e5d3dec481414b9e9eedefe5cf39ab22a53475c605309ffecc91332536edd45c5b826a462cab851136cffb0c530109896612eaff224a
-
SSDEEP
3072:usaHDDNo6/c0Xg0L/rZPFBpMNjypLb7Ot2MfcJaQOMpJq71qSDJw5:usaHDDR00Xg0bDojypLb7yWEMFQC5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 6927f901f72a2469955243024e6d6595_JaffaCakes118
Files
-
6927f901f72a2469955243024e6d6595_JaffaCakes118.exe windows:5 windows x86 arch:x86
6b53fd1ca59a3a16ba6db6a38ec3e96a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
wsprintfW
SendMessageA
SetWindowTextA
PostQuitMessage
GetDlgCtrlID
ReleaseDC
LoadCursorA
RegisterClassExA
GetWindowLongA
ShowWindow
SetWindowLongA
CreateWindowExA
GetDC
CopyImage
PostMessageA
GetSystemMetrics
SetWindowPos
GetMessageA
TranslateMessage
DefWindowProcA
DispatchMessageA
gdi32
CreateFontW
GetStockObject
SetTextColor
SetBkColor
CreateSolidBrush
GetDeviceCaps
ole32
CoInitializeSecurity
CoInitializeEx
CreateStreamOnHGlobal
CoCreateInstance
CoUninitialize
kernel32
SetEnvironmentVariableA
CompareStringW
LoadLibraryW
WriteConsoleW
HeapSize
SetStdHandle
LocalFree
FlushFileBuffers
UnhandledExceptionFilter
GetStringTypeW
Sleep
WaitForSingleObject
GetLastError
CreateThread
GetModuleHandleA
HeapAlloc
GetProcessHeap
SetCurrentDirectoryA
GetProcAddress
HeapReAlloc
WriteFile
CloseHandle
CreateFileA
GetTempFileNameW
WaitForMultipleObjects
GetModuleHandleW
GetTempFileNameA
ExpandEnvironmentStringsA
GetVersionExA
GetCurrentProcess
GlobalUnlock
GlobalLock
GlobalAlloc
SizeofResource
LockResource
LoadResource
FindResourceA
VirtualFree
VirtualAlloc
ReadFile
SetFilePointer
HeapFree
CreateFileW
GetModuleFileNameW
GetVolumeInformationW
lstrcpynW
GetWindowsDirectoryW
InterlockedDecrement
SwitchToThread
InterlockedIncrement
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetCurrentProcessId
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
DecodePointer
EncodePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
RaiseException
ExitProcess
GetStdHandle
HeapCreate
WideCharToMultiByte
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
RtlUnwind
GetConsoleCP
GetConsoleMode
LCMapStringW
MultiByteToWideChar
winhttp
WinHttpQueryDataAvailable
WinHttpReadData
WinHttpSendRequest
WinHttpReceiveResponse
WinHttpOpen
WinHttpCloseHandle
WinHttpOpenRequest
WinHttpConnect
oleaut32
VariantClear
SysAllocString
SysFreeString
OleLoadPicture
VariantInit
advapi32
OpenSCManagerA
RegOpenKeyExA
CloseServiceHandle
OpenServiceW
RegCloseKey
iphlpapi
GetAdaptersInfo
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ