Static task
static1
Behavioral task
behavioral1
Sample
9ac7c58081f84c4e35c3168d40efd6cf_JaffaCakes118.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
9ac7c58081f84c4e35c3168d40efd6cf_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
9ac7c58081f84c4e35c3168d40efd6cf_JaffaCakes118
-
Size
9.9MB
-
MD5
9ac7c58081f84c4e35c3168d40efd6cf
-
SHA1
aad412f90ab9e57c1a8895972682c5e4356ada7f
-
SHA256
35ab8337e2968ac46523ef7bcf09134558c7ee12d2025bf5527da3ef04b98c59
-
SHA512
7525386b413d79398d843228b5b12bcfece975af6eb6327f61a778ef72cadace8655b622630d3f385bd0db1c317548b804839faba5e7ac57c6d4fe82e877cef0
-
SSDEEP
196608:Uvr9HM8EYZU+A4I0kUdb0huGUbJm4wX6swk3aQx7LVHD+zTxqLc5v:Ujy5fKkmZbJzk3Z7HyzTx95
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9ac7c58081f84c4e35c3168d40efd6cf_JaffaCakes118
Files
-
9ac7c58081f84c4e35c3168d40efd6cf_JaffaCakes118.exe windows:4 windows x86 arch:x86
cc3d30310a2c54cf61fa03ce1e77e3de
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ShellExecuteA
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetMalloc
FindExecutableA
user32
GetSysColor
GetClientRect
SetRect
EndPaint
LoadCursorA
GetLastActivePopup
ShowWindow
PostMessageA
SendMessageA
EnableWindow
GetWindowLongA
SetWindowLongA
SetWindowTextA
SetForegroundWindow
SetActiveWindow
DialogBoxIndirectParamA
GetDlgItemTextA
EndDialog
GetWindowRect
BeginPaint
SetWindowPos
GetKeyState
CharUpperBuffA
SetTimer
KillTimer
SendDlgItemMessageA
UpdateWindow
SetDlgItemTextA
GetDlgItem
InvalidateRect
OemToCharBuffA
PeekMessageA
TranslateMessage
DispatchMessageA
GetParent
MessageBoxA
SetCursor
CharNextA
SetWindowWord
GetWindowWord
DefWindowProcA
RegisterClassA
GetSystemMetrics
kernel32
lstrlenA
SetStdHandle
GetLocaleInfoA
GetSystemInfo
VirtualProtect
VirtualAlloc
GetCPInfo
GetOEMCP
GetACP
LCMapStringW
MultiByteToWideChar
LCMapStringA
HeapSize
HeapAlloc
HeapReAlloc
VirtualQuery
InterlockedExchange
LoadLibraryA
GetStringTypeW
GetStringTypeA
HeapFree
VirtualFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetLastError
WideCharToMultiByte
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
FindClose
FindFirstFileA
GetCurrentDirectoryA
CreateDirectoryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
LocalAlloc
_lopen
GetDriveTypeA
GetEnvironmentVariableA
GlobalFree
GlobalUnlock
GlobalHandle
_lclose
_llseek
_lread
GlobalLock
GlobalAlloc
LocalFree
GlobalMemoryStatus
GetVersion
GetModuleFileNameA
WriteFile
GetSystemTime
ExitProcess
CloseHandle
CreateFileA
SetCurrentDirectoryA
FlushFileBuffers
_lcreat
GetVolumeInformationA
GetWindowsDirectoryA
SetFilePointer
WinExec
_lwrite
lstrcmpiA
SetErrorMode
GetProcAddress
GetModuleHandleA
TerminateProcess
GetCurrentProcess
GetStartupInfoA
GetCommandLineA
GetVersionExA
QueryPerformanceCounter
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
GetStdHandle
gdi32
SelectObject
SetTextAlign
SetBkColor
SetTextColor
DeleteObject
GetBkColor
GetTextExtentPoint32A
ExtTextOutA
CreateDCA
GetDeviceCaps
CreateFontIndirectA
DeleteDC
advapi32
RegQueryValueA
comctl32
ord17
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_winzip_ Size: 9.8MB - Virtual size: 9.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ