Static task
static1
Behavioral task
behavioral1
Sample
0324aebb2b7fff87029f08b0cd2fa15f_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0324aebb2b7fff87029f08b0cd2fa15f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0324aebb2b7fff87029f08b0cd2fa15f_JaffaCakes118
-
Size
688KB
-
MD5
0324aebb2b7fff87029f08b0cd2fa15f
-
SHA1
2100a3b8873eb16b0d14c6aae31ee87c1f1cbf60
-
SHA256
9de3e21a4caf6ae8dafd737f4bc3f9bcd81f540844a295a2c7b6af291db80a6a
-
SHA512
1e594ee962d958c439401e0840cacdb273711b29e01f0e9a921da8bbf8640901a3f642369c711538151b635534d606c746516654905a7662efea36a84ca38337
-
SSDEEP
12288:VCmBkchNHN6AkLMp7AXVORsQSRZDrU3pHCT4QwjYP4abHTAYa8AbHyu55:VCYkchNHN6AkLMp7AXV2vSRZD0Qhj4a6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0324aebb2b7fff87029f08b0cd2fa15f_JaffaCakes118
Files
-
0324aebb2b7fff87029f08b0cd2fa15f_JaffaCakes118.exe windows:4 windows x86 arch:x86
7d15dde2205249b648b6abefdfa66cf2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SendDlgItemMessageA
SetWindowsHookExW
SetClipboardData
RegisterClassExA
EnumDisplaySettingsW
GetSysColor
RegisterClassA
EnumDisplaySettingsA
DdeCreateDataHandle
ValidateRect
DdeCmpStringHandles
SetMessageExtraInfo
CreateWindowExW
CopyRect
DdeQueryStringA
comctl32
InitCommonControlsEx
kernel32
SetEnvironmentVariableA
GetCalendarInfoA
ReadFile
SetFilePointer
TlsGetValue
GetEnvironmentStrings
TlsSetValue
CloseHandle
EnterCriticalSection
FreeEnvironmentStringsA
VirtualQuery
GetFileType
GetProcessHeap
InitializeCriticalSection
HeapFree
FlushFileBuffers
HeapAlloc
CreateProcessW
GetModuleHandleA
HeapSize
WriteConsoleW
RtlUnwind
GetCurrentThreadId
GetStartupInfoA
WideCharToMultiByte
LCMapStringW
GetTickCount
SetHandleCount
CreateProcessA
HeapReAlloc
IsDebuggerPresent
GetSystemDefaultLangID
RtlMoveMemory
GetOEMCP
EnumDateFormatsW
GetConsoleCP
SetLastError
GetWindowsDirectoryA
LoadLibraryA
GetStringTypeA
GetConsoleMode
GetLongPathNameA
GetConsoleOutputCP
QueryPerformanceCounter
CreateMutexA
IsValidCodePage
GetVersionExA
CompareStringW
HeapDestroy
SetUnhandledExceptionFilter
OpenMutexA
FreeEnvironmentStringsW
GetTimeFormatA
GetProcessAffinityMask
SetStdHandle
GetCPInfo
GetModuleFileNameA
lstrcmpA
GetCurrentThread
GetEnvironmentVariableW
GetStdHandle
GetCurrentProcessId
GetEnvironmentStringsW
SleepEx
UnhandledExceptionFilter
GetMailslotInfo
GetLocaleInfoW
GetLocaleInfoA
IsValidLocale
GetProcAddress
EnumDateFormatsExW
WriteFile
SetConsoleCtrlHandler
SetConsoleTextAttribute
EnumSystemLocalesA
GetLastError
InterlockedExchange
InterlockedIncrement
TerminateProcess
GetUserDefaultLCID
LeaveCriticalSection
GetCommandLineA
GetModuleHandleW
DeleteCriticalSection
VirtualAlloc
FreeLibrary
GetSystemTimeAsFileTime
VirtualFree
LocalFileTimeToFileTime
WriteConsoleA
GetStartupInfoW
GetCurrentProcess
TlsFree
GetStringTypeW
GetTimeZoneInformation
ExitProcess
HeapCreate
GetACP
CreateFileA
GetDateFormatA
CompareStringA
LCMapStringA
TlsAlloc
InterlockedDecrement
MultiByteToWideChar
Sleep
Sections
.text Size: 305KB - Virtual size: 305KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 365KB - Virtual size: 365KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ