Static task
static1
Behavioral task
behavioral1
Sample
024fd10a6eaada72a5892f52472c2275_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
024fd10a6eaada72a5892f52472c2275_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
024fd10a6eaada72a5892f52472c2275_JaffaCakes118
-
Size
180KB
-
MD5
024fd10a6eaada72a5892f52472c2275
-
SHA1
6ccba175bcd375178d45b5facc6a4c2f487ff1ec
-
SHA256
c4c9a97b5e7bb63f2c8592c7d686c6056465232a3f0bc0ce35d015386c02c23e
-
SHA512
7eb037dad3abb954d4db37713081c19a99474fcf3ed01c7d78955c6cf5317d2d0c6326befa083c0e752950be17d7c378d967dd00e0ae3a0ca3cf63daf7cccb92
-
SSDEEP
3072:Vq6dsa/xbFJDd7eBT62oNjJj30CHRkJNHNurtdh:ds+JDd8eHN/kJNtuJd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 024fd10a6eaada72a5892f52472c2275_JaffaCakes118
Files
-
024fd10a6eaada72a5892f52472c2275_JaffaCakes118.exe windows:4 windows x86 arch:x86
de799dcbbdf04e6cbc76f45a3bd2ff8b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
DragFinish
DragAcceptFiles
DragQueryFileA
gdi32
CreatePalette
SetBkMode
SetMapMode
SetDIBitsToDevice
RealizePalette
SelectPalette
GetDeviceCaps
GetTextMetricsA
SelectObject
CreateFontIndirectA
GetStockObject
TextOutA
DeleteObject
CreateBrushIndirect
user32
GetWindowTextA
SetWindowTextA
PostQuitMessage
SetCaretPos
ShowCaret
HideCaret
MessageBeep
CreateCaret
FlashWindow
GetMessageA
GetDC
ReleaseDC
PeekMessageA
DispatchMessageA
TranslateMessage
SetWindowLongA
GetWindowLongA
MessageBoxA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetWindowRect
SetScrollRange
SetScrollPos
GetParent
ScrollWindow
VkKeyScanA
DestroyCaret
BeginPaint
FillRect
EndPaint
DefWindowProcA
IsZoomed
GetClientRect
SendMessageA
BringWindowToTop
KillTimer
IsWindow
IsIconic
SetTimer
GetSysColor
CreateWindowExA
MoveWindow
ShowWindow
CheckMenuItem
InvalidateRect
UpdateWindow
GetSystemMenu
GetMenuStringA
RemoveMenu
AppendMenuA
EnableMenuItem
LoadIconA
LoadCursorA
RegisterClassA
DestroyWindow
GetClipboardData
IsClipboardFormatAvailable
GetKeyState
advapi32
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
kernel32
LCMapStringW
LCMapStringA
CloseHandle
ReadFile
SetStdHandle
SetEnvironmentVariableA
GetOEMCP
GetACP
CompareStringW
CompareStringA
GetCPInfo
FlushFileBuffers
InterlockedIncrement
InterlockedDecrement
SetFilePointer
WriteFile
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
WideCharToMultiByte
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
GetFileType
SetHandleCount
DeleteCriticalSection
InitializeCriticalSection
HeapReAlloc
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersionExA
GetEnvironmentVariableA
GetStartupInfoA
LeaveCriticalSection
EnterCriticalSection
GetCurrentProcess
TerminateProcess
ExitProcess
RtlUnwind
HeapFree
HeapAlloc
GetVersion
GlobalReAlloc
SetLastError
FreeLibrary
GetProcAddress
GetLastError
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
GetPrivateProfileStringA
GetSystemTime
WriteConsoleInputA
GenerateConsoleCtrlEvent
GetStdHandle
ReleaseMutex
WaitForSingleObject
GlobalUnlock
GlobalLock
GlobalAlloc
WritePrivateProfileStringA
GetPrivateProfileIntA
lstrlenA
GetCommandLineA
MulDiv
Sections
.text Size: 60KB - Virtual size: 58KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rmnet Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE