Static task
static1
Behavioral task
behavioral1
Sample
02ce57037299d332f44219dfe2fe5c1b_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
02ce57037299d332f44219dfe2fe5c1b_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
02ce57037299d332f44219dfe2fe5c1b_JaffaCakes118
-
Size
224KB
-
MD5
02ce57037299d332f44219dfe2fe5c1b
-
SHA1
1c9df103b10a1f6dfa39139a079737aed9a5a197
-
SHA256
541902d11c1c5b40d33a3d82e0b3bc28438cfe86bd5e3ab7be7565c21c64612c
-
SHA512
57c4acc5949a4fcce2e706c32842bbd6be97aae360f570b0d7b064a0595d7a95f503784b3cd6f506324e59bd59b33e94d424d614a926717c571af56fa73bb18b
-
SSDEEP
6144:vHwG9+mjJNlzevhnJfmGR92ZaznubDRYq9rU:jLjtevhn4GCDDRYq9w
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 02ce57037299d332f44219dfe2fe5c1b_JaffaCakes118
Files
-
02ce57037299d332f44219dfe2fe5c1b_JaffaCakes118.exe windows:5 windows x86 arch:x86
ae898cec1547ee0942e9fc513e93520a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDeviceCaps
ole32
DcomChannelSetHResult
CLSIDFromProgID
CoTaskMemFree
advapi32
RegOpenKeyExA
EqualSid
FreeSid
GetTokenInformation
AdjustTokenPrivileges
RegQueryInfoKeyA
RegDeleteValueA
RegSetValueExA
RegCloseKey
OpenProcessToken
RegCreateKeyExA
RegQueryValueExA
kernel32
GlobalAlloc
IsDBCSLeadByte
GetCurrentProcessId
SetThreadAffinityMask
GetProcAddress
SetPriorityClass
GetLastError
CreateEventA
FindNextFileA
GlobalFree
FindClose
FindResourceA
GlobalFindAtomW
SetFileTime
FindFirstFileA
lstrcmpiA
GetModuleFileNameA
GetTickCount
GetCommandLineA
CreateDirectoryA
lstrcatA
CreateFileA
GlobalUnlock
GetDriveTypeA
FormatMessageA
InterlockedExchangeAdd
SetCurrentDirectoryA
GetSystemDirectoryA
lstrcmpA
SetFilePointer
GetDiskFreeSpaceA
DeleteFileA
_llseek
SetHandleInformation
LocalAlloc
GetWindowsDirectoryA
IsValidLocale
GetComputerNameW
_lclose
RemoveDirectoryA
GetComputerNameA
SizeofResource
IsBadCodePtr
GetShortPathNameA
ReadFile
LoadResource
LoadLibraryExA
GetVolumeInformationA
GetTempFileNameA
_lopen
CreateProcessA
MulDiv
lstrlenA
SetEvent
GetFileAttributesA
FreeResource
GetModuleHandleA
GetCurrentThreadId
GetTempPathA
GetSystemInfo
CreateMutexA
lstrcpyA
GetPriorityClass
ResetEvent
WriteFile
GetCurrentDirectoryA
LockResource
lstrcpynA
CreateEventA
ExitProcess
GlobalLock
FatalAppExitA
SetFileAttributesA
FreeLibrary
GetCurrentProcess
GetStringTypeExA
LocalFree
GetVersionExA
ws2_32
WSASocketW
WSAAddressToStringW
user32
LoadStringA
SetWindowTextA
CharNextA
SetWindowPos
SetWindowLongA
EnableWindow
MessageBoxA
DispatchMessageA
ShowWindow
PeekMessageA
SendMessageA
GetWindowLongA
GetWindowRect
CharUpperA
wsprintfA
GetDesktopWindow
MessageBeep
GetDlgItem
ExitWindowsEx
GetSystemMetrics
SetDlgItemTextA
GetDlgItemTextA
CharPrevA
EndDialog
CallWindowProcA
Sections
.text Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 191KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ