Static task
static1
Behavioral task
behavioral1
Sample
00d388e6b30c1b414750bf68a37d0ba7_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
00d388e6b30c1b414750bf68a37d0ba7_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
00d388e6b30c1b414750bf68a37d0ba7_JaffaCakes118
-
Size
427KB
-
MD5
00d388e6b30c1b414750bf68a37d0ba7
-
SHA1
8e903b28b585b3478e0ee9fc0299435b348fcb10
-
SHA256
08e3f2bd1999e3221ea1145fbdfbbe8e45a256a7885197f2c25cbc46e61f6120
-
SHA512
a3ab190aaa3912c0196cd60a1f40501c5a84bb3381776743b2ea41e0a2b6fd22a64d950818bfa4d3a1590b7d0c6dedb963461a89de982028f369fa827c52c1e6
-
SSDEEP
6144:xpHoEZUfjGdnhAcXSAmX3pEICkgc9OOaqnIlza/BTh0UHpnna0dMci8y+zG4/nG6:jjJFhAZAg3iICFc9bnI4/BT3ZmjyD/B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00d388e6b30c1b414750bf68a37d0ba7_JaffaCakes118
Files
-
00d388e6b30c1b414750bf68a37d0ba7_JaffaCakes118.exe windows:4 windows x86 arch:x86
24dbd0dcbe24af49e9ccaaa8f557ee48
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CascadeWindows
GetDlgCtrlID
IsWindowVisible
SetWindowPlacement
GetTopWindow
CloseWindow
GetWindowTextLengthA
GetParent
BringWindowToTop
SendDlgItemMessageA
GetSysColor
ole32
StgOpenStorage
CoInstall
CoGetObject
ReadClassStg
OleCreateLinkToFileEx
CLSIDFromString
OleCreateLink
CoUnmarshalInterface
CoIsHandlerConnected
CoTreatAsClass
FmtIdToPropStgName
CoRegisterPSClsid
oledlg
ord6
ord12
ord10
ord3
ord11
ord7
ord4
ord1
ord8
ord2
oleaut32
CreateStdDispatch
advapi32
RegSaveKeyA
RegEnumKeyA
RegLoadKeyA
RegCloseKey
RegDeleteKeyA
RegFlushKey
RegDeleteValueA
RegSetValueExA
RegConnectRegistryA
RegOpenKeyExA
kernel32
GetModuleHandleA
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
GetProcAddress
GetStdHandle
GetFileType
GetCurrentThreadId
TlsSetValue
TlsAlloc
GetStringTypeW
TlsGetValue
GetLastError
HeapDestroy
HeapCreate
VirtualFree
HeapFree
WriteFile
GetStartupInfoA
GetStringTypeA
SetLastError
RtlUnwind
SetHandleCount
PulseEvent
ReleaseSemaphore
LocalLock
LocalFlags
HeapLock
LocalAlloc
VirtualAllocEx
CreateEventA
GlobalFree
GetOverlappedResult
HeapValidate
GetPrivateProfileIntA
GetPrivateProfileStructA
GetProfileStringA
WritePrivateProfileStructA
WritePrivateProfileStringA
LCMapStringW
LCMapStringA
MultiByteToWideChar
LoadLibraryA
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
Sections
.text Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 297KB - Virtual size: 384KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bdmm Size: 103KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ