Static task
static1
Behavioral task
behavioral1
Sample
0376eeac343d6f8cb3360bcf50e22192_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0376eeac343d6f8cb3360bcf50e22192_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0376eeac343d6f8cb3360bcf50e22192_JaffaCakes118
-
Size
104KB
-
MD5
0376eeac343d6f8cb3360bcf50e22192
-
SHA1
4aba629b63aa041b859f2ea693772cdac365682c
-
SHA256
6fd121074bb3d4f18554ba5f202cb1f9025e6ffda9843ec6c4f808dc0d20b97c
-
SHA512
7d118e6d0194d4b21039f9440ec86f810056ce4b7c64e020972da65224073c5e510c13fa19b1eebe19aa4c7711d4335c41eeb759b53ab255db59ffa7ec8313d0
-
SSDEEP
1536:543ps3Zno4YdZlaB4PNns5ND8M1pXWozDHE+o+WDJqisdPdjxFsB:513Zno4YDi4Vns598Hoz7BonDJ2bF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0376eeac343d6f8cb3360bcf50e22192_JaffaCakes118
Files
-
0376eeac343d6f8cb3360bcf50e22192_JaffaCakes118.exe windows:4 windows x86 arch:x86
206d1141e9e726c79a529bba34866b09
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
WriteFile
lstrlenA
CreateFileA
GetModuleHandleA
ReadFile
SetStdHandle
SetFilePointer
LCMapStringW
LCMapStringA
HeapReAlloc
VirtualAlloc
HeapAlloc
GetOEMCP
GetACP
GetCPInfo
HeapValidate
IsBadReadPtr
IsBadWritePtr
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
GetLastError
RtlUnwind
VirtualFree
HeapFree
HeapCreate
HeapDestroy
GetFileType
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetModuleFileNameA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
DebugBreak
GetStdHandle
InterlockedDecrement
OutputDebugStringA
GetProcAddress
LoadLibraryA
InterlockedIncrement
FlushFileBuffers
user32
keybd_event
LoadIconA
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
GetClientRect
DrawTextA
EndPaint
UnhookWindowsHookEx
PostQuitMessage
CreateWindowExA
SetWindowsHookExA
ShowWindow
UpdateWindow
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
GetDlgItem
SetWindowTextA
GetWindowTextA
EndDialog
CallNextHookEx
shell32
Shell_NotifyIconA
winmm
timeSetEvent
timeKillEvent
Sections
.text Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ