Static task
static1
Behavioral task
behavioral1
Sample
b1301563bf72105e2b737cfc9d86be81_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
b1301563bf72105e2b737cfc9d86be81_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
b1301563bf72105e2b737cfc9d86be81_JaffaCakes118
-
Size
136KB
-
MD5
b1301563bf72105e2b737cfc9d86be81
-
SHA1
d8d4a5bffac458846c701f11b043cc5459395520
-
SHA256
f220133dcf72aece976ede998c37094e587c1e5f88d51838b27ec1fdf9e54397
-
SHA512
5818c8150bf372d2eaabc9ebaa2ba1c0237319a372562cbda227fe435245cc2099bdb4ca6702847f221cc6685a2c03e2fe3ac617d37473dcd815edebcd50908d
-
SSDEEP
3072:rkyFGEjO5mgL/4t6Jfu0FAlnyGlVdtzFIVz:1FQhXFAt/3h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b1301563bf72105e2b737cfc9d86be81_JaffaCakes118
Files
-
b1301563bf72105e2b737cfc9d86be81_JaffaCakes118.exe windows:4 windows x86 arch:x86
ebed986e27314367899449a020dd58e1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetRect
wsprintfA
AppendMenuA
BeginPaint
SendDlgItemMessageA
SendMessageA
SetActiveWindow
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetMenuItemBitmaps
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
TrackPopupMenu
UpdateWindow
CreateWindowExA
CreateDialogParamA
CloseWindow
ChangeDisplaySettingsA
ShowWindow
comdlg32
GetOpenFileNameA
GetSaveFileNameA
ChooseColorA
shell32
ShellExecuteA
SHChangeNotify
advapi32
RegOpenKeyExA
RegSetValueA
OpenProcessToken
RegQueryValueA
RegQueryValueExA
gdi32
ChoosePixelFormat
CreateCompatibleBitmap
CreateCompatibleDC
CreateFontA
CreatePen
CreateSolidBrush
DeleteDC
DeleteObject
LineTo
MoveToEx
Polygon
SelectObject
SetBkColor
SetBkMode
SetPixelFormat
SetTextColor
SwapBuffers
TextOutA
BitBlt
comctl32
ImageList_LoadImageA
ord17
kernel32
GetEnvironmentStrings
WideCharToMultiByte
HeapSize
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSection
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RaiseException
FreeEnvironmentStringsW
FindResourceA
CloseHandle
CreateDirectoryA
GetUserDefaultLangID
GetVersion
GetWindowsDirectoryA
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatusEx
GlobalUnlock
LoadLibraryA
LoadResource
LockResource
MapViewOfFile
OpenFileMappingA
OpenProcess
QueryPerformanceCounter
QueryPerformanceFrequency
ReadFile
CreateFileA
CreateFileMappingA
CreateProcessA
CreateThread
DeleteFileA
DeviceIoControl
ExitProcess
ExitThread
FreeLibrary
GetCommandLineA
GetCurrentDirectoryA
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetFileSize
GetLastError
GetLocalTime
GetModuleHandleA
GetPriorityClass
GetProcAddress
GetSystemDirectoryA
SetFilePointer
GetSystemInfo
GetTempPathA
GetThreadPriority
lstrlenA
lstrcpyA
lstrcmpiA
lstrcatA
WriteFile
VirtualFree
VirtualAlloc
GetTickCount
UnmapViewOfFile
TerminateThread
TerminateProcess
Sleep
SetThreadPriority
SetThreadAffinityMask
SetProcessAffinityMask
HeapReAlloc
HeapAlloc
HeapFree
GetVersionExA
GetProcessHeap
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
HeapCreate
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CODE Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ