Static task
static1
Behavioral task
behavioral1
Sample
7e40b30ba0c14a330397fb96b891223c_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7e40b30ba0c14a330397fb96b891223c_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
7e40b30ba0c14a330397fb96b891223c_JaffaCakes118
-
Size
182KB
-
MD5
7e40b30ba0c14a330397fb96b891223c
-
SHA1
2489c1c3b8c3718575190efae259a326e197699d
-
SHA256
60abfef37d753110b4976540753511183ae5ed4a7e69cd5b5f17922c7ea253dc
-
SHA512
fe80b961dcd77cce25dd3eed2030b039a961af383ad558cd3993f0cb876e8c623539400312329ca6e987b3608a6ce9fa0540f9ba8d342f718e71a88683faafa7
-
SSDEEP
3072:okSSQ4IJXBhGUeJ+0aZH+tNtHBjH9ZcubynVy7I+YM0oThw+5yW+I0dlUr:6aIJRhBe0H+3fjHaZG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7e40b30ba0c14a330397fb96b891223c_JaffaCakes118
Files
-
7e40b30ba0c14a330397fb96b891223c_JaffaCakes118.exe windows:5 windows x86 arch:x86
ac725a7308759e4187af9fe6a1bff2d6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
MessageBeep
PeekMessageA
GetSysColor
GetClassNameA
MessageBoxA
DispatchMessageA
MapWindowPoints
GetClientRect
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
advapi32
RegCloseKey
RegOpenKeyExA
RegQueryValueExA
gdi32
DeleteObject
CreateFontIndirectA
TextOutA
SetTextColor
SelectObject
SetBkMode
GetTextExtentPointA
GetDeviceCaps
GetObjectA
comctl32
PropertySheetA
kernel32
IsProcessorFeaturePresent
LoadLibraryW
EnterCriticalSection
HeapReAlloc
HeapSize
CreateFileA
HeapAlloc
GetProcessHeap
GetProcAddress
HeapFree
GetModuleHandleA
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
WideCharToMultiByte
GetStringTypeA
GetStringTypeW
MultiByteToWideChar
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
GetCPInfo
GetACP
GetOEMCP
SetHandleCount
GetStdHandle
CloseHandle
SetStdHandle
GetFileType
RtlUnwind
LCMapStringA
LCMapStringW
FlushFileBuffers
lstrcpynA
CompareStringA
FindResourceA
lstrlenA
lstrcpyA
FindClose
FindFirstFileA
GetDiskFreeSpaceA
Sleep
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
GetFileAttributesA
lstrcatA
MoveFileExA
GetShortPathNameA
GetPrivateProfileSectionA
WritePrivateProfileStringA
WritePrivateProfileSectionA
GetModuleFileNameA
GetSystemDefaultLCID
MulDiv
ExitProcess
FindNextFileA
RemoveDirectoryA
GetStartupInfoA
WaitForSingleObject
CreateProcessA
GetLastError
FormatMessageA
LoadResource
LockResource
IsDBCSLeadByte
lstrcmpA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
GetTempFileNameA
FreeLibrary
DeleteFileA
DosDateTimeToFileTime
LocalFileTimeToFileTime
SetFileTime
SetFileAttributesA
GetPrivateProfileStringA
CreateDirectoryA
ReadFile
SetFilePointer
WriteFile
HeapSetInformation
GetStartupInfoW
SetUnhandledExceptionFilter
IsDebuggerPresent
InterlockedIncrement
InterlockedDecrement
IsValidCodePage
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
DecodePointer
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
Sections
.text Size: 157KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CODE Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ