Static task
static1
Behavioral task
behavioral1
Sample
036fc7b299c22a5e7bf60de7c7335f17_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
036fc7b299c22a5e7bf60de7c7335f17_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
036fc7b299c22a5e7bf60de7c7335f17_JaffaCakes118
-
Size
192KB
-
MD5
036fc7b299c22a5e7bf60de7c7335f17
-
SHA1
b32b632d2cc2e5583dfaa7a0b6530666c703cf08
-
SHA256
f6e764417d4cf9f33f33db2b693fa3bc675ebb636d09219eda81f97ba2553573
-
SHA512
f513d1d702d921e210bb8dc35b16e666fe4f8981ab280ce59cdb634770618ef45e335f7e757102971400f1d8f2440cae8f18f963a2c7c4550dc788d7ea98bd98
-
SSDEEP
3072:s2aCYfrbwgDO8Wwi81SUHFJV7VDgTMagiuygIYdjzOHKXU3qdncwKrF/s:pY/wgq55cSWFJVlC9sIYdjzOHg7ncjNs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 036fc7b299c22a5e7bf60de7c7335f17_JaffaCakes118
Files
-
036fc7b299c22a5e7bf60de7c7335f17_JaffaCakes118.exe windows:4 windows x86 arch:x86
f1c86bf7ba6c9508e02f21633db7d001
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
SetFilePointer
ReadFile
CreateDirectoryA
GetPrivateProfileStringA
SetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetProcAddress
DeleteFileA
FreeLibrary
GetTempFileNameA
LoadLibraryA
GetTempPathA
GetSystemDirectoryA
GetWindowsDirectoryA
lstrcmpA
IsDBCSLeadByte
LockResource
LoadResource
FormatMessageA
GetLastError
CreateProcessA
WaitForSingleObject
GetStartupInfoA
RemoveDirectoryA
FindNextFileA
ExitProcess
MulDiv
GetSystemDefaultLCID
GetModuleFileNameA
WritePrivateProfileSectionA
WritePrivateProfileStringA
GetPrivateProfileSectionA
GetShortPathNameA
MoveFileExA
lstrcatA
GetFileAttributesA
CreateFileA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
Sleep
GetDiskFreeSpaceA
FindFirstFileA
FindClose
lstrcpyA
lstrlenA
FindResourceA
CompareStringA
lstrcpynA
FlushFileBuffers
LCMapStringW
LCMapStringA
RtlUnwind
GetFileType
SetStdHandle
CloseHandle
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
MultiByteToWideChar
GetStringTypeW
GetStringTypeA
WideCharToMultiByte
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetVersion
GetCommandLineA
GetModuleHandleA
HeapFree
HeapAlloc
user32
SetWindowPos
SendMessageA
TranslateMessage
wsprintfA
GetWindowLongA
GetParent
SetWindowTextA
GetWindowTextA
GetWindow
SetDlgItemTextA
EndDialog
SendDlgItemMessageA
LoadStringA
CharNextA
DialogBoxParamA
IsCharAlphaA
CharNextExA
GetDesktopWindow
GetDlgItemTextA
KillTimer
EnableWindow
SetTimer
PostMessageA
SetFocus
CreateDialogParamA
DestroyWindow
GetDlgItem
GetDC
ReleaseDC
ScreenToClient
SetWindowLongA
CreateWindowExA
GetWindowRect
SystemParametersInfoA
MessageBeep
PeekMessageA
GetSysColor
GetClassNameA
MessageBoxA
DispatchMessageA
MapWindowPoints
GetClientRect
gdi32
CreateFontIndirectA
TextOutA
SetTextColor
SelectObject
SetBkMode
GetTextExtentPointA
GetDeviceCaps
GetObjectA
DeleteObject
comctl32
ord17
PropertySheetA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
lz32
LZOpenFileA
LZCopy
LZClose
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vfbc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.8rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE