Static task
static1
Behavioral task
behavioral1
Sample
0299fd4c1f83427466b9ef2808f00b3d_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0299fd4c1f83427466b9ef2808f00b3d_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0299fd4c1f83427466b9ef2808f00b3d_JaffaCakes118
-
Size
166KB
-
MD5
0299fd4c1f83427466b9ef2808f00b3d
-
SHA1
76c276417e0039ec9307e393c0471e673bf82b1e
-
SHA256
d278100e6189208408028841c5790547665d8189f71dcabaed0d0e5516749fcc
-
SHA512
7f0569cfc7352f28c44e123071f14c27c18eea54ebaff7e0d9209c59e1995e0f934d509d6a41608f53cdf93ae4cd206952eb3a4f00b047c17e57f3431bf1d1a4
-
SSDEEP
3072:ciYom1ex7pJZzpf8oQi/EkwN4+33ZSlQs7jeWGPAeh3T3WFX:dYUx7pzzLQi8HN4m3IlQWjeTVpT3e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0299fd4c1f83427466b9ef2808f00b3d_JaffaCakes118
Files
-
0299fd4c1f83427466b9ef2808f00b3d_JaffaCakes118.exe windows:4 windows x86 arch:x86
3be61fe7428ef22be4d07205ca56ab43
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFindExtensionA
gdi32
DeleteObject
SelectObject
GetTextMetricsA
GetTextExtentPointA
GetDeviceCaps
CreateFontIndirectA
ole32
CoTaskMemAlloc
CoCreateInstance
CoTaskMemFree
StringFromGUID2
CoTaskMemRealloc
advapi32
RegDeleteKeyA
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
RegQueryInfoKeyA
kernel32
GetStringTypeA
WideCharToMultiByte
GetCPInfo
SetFilePointer
SetHandleCount
GetStringTypeW
lstrlenA
TlsGetValue
SetHandleInformation
SetStdHandle
GetFileType
lstrcmpiA
IsBadReadPtr
SetUnhandledExceptionFilter
LCMapStringW
FlushFileBuffers
IsBadWritePtr
GetSystemTimeAsFileTime
LCMapStringA
FreeEnvironmentStringsW
TerminateProcess
LoadLibraryA
TlsSetValue
GetStartupInfoA
WriteFile
GetProcessHeap
LeaveCriticalSection
GetThreadLocale
TransmitCommChar
VirtualProtect
CloseHandle
FreeEnvironmentStringsA
InterlockedDecrement
SetLastError
FindResourceA
MultiByteToWideChar
QueryPerformanceCounter
GetCommandLineA
GetVersionExA
GetOEMCP
GetCurrentProcessId
GetProcAddress
TlsAlloc
IsDBCSLeadByte
RaiseException
GetModuleHandleA
ExitProcess
EnumResourceNamesW
MulDiv
FlushInstructionCache
EnterCriticalSection
IsBadCodePtr
LockResource
ExitProcess
InterlockedIncrement
lstrcpyA
InterlockedExchange
HeapDestroy
InitializeCriticalSection
GetEnvironmentStrings
GetLocaleInfoA
lstrcpynA
FreeLibrary
VirtualAlloc
GetModuleFileNameA
SizeofResource
lstrcatA
GetCurrentProcess
RtlUnwind
LoadLibraryExA
GetSystemInfo
UnhandledExceptionFilter
VirtualQuery
GetEnvironmentStringsW
HeapReAlloc
GetACP
DeleteCriticalSection
GetLastError
LoadResource
lstrlenW
HeapAlloc
VirtualFree
DisableThreadLibraryCalls
HeapSize
HeapCreate
TlsFree
GetStdHandle
GetTickCount
GetCurrentThreadId
HeapFree
msimg32
AlphaBlend
TransparentBlt
user32
SendMessageA
GetDialogBaseUnits
MoveWindow
CreateDialogParamA
IsWindow
UnregisterClassA
CheckDlgButton
ReleaseDC
IsDlgButtonChecked
GetDlgItemTextA
ShowWindow
IsDialogMessageA
SetDlgItemTextA
SetWindowLongA
GetDlgItem
GetDC
WinHelpA
DestroyWindow
EnableWindow
CharNextA
Sections
.text Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.crt Size: 512B - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ