Static task
static1
Behavioral task
behavioral1
Sample
043db667507facb5fecc5e988b83b38f_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
043db667507facb5fecc5e988b83b38f_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
043db667507facb5fecc5e988b83b38f_JaffaCakes118
-
Size
41KB
-
MD5
043db667507facb5fecc5e988b83b38f
-
SHA1
db961e310e7b286cc7df5f983bb12943b60b93a3
-
SHA256
289dffdd2795159531dadfd87ed23295a3bae53c85339c2a79deb29ca1efd899
-
SHA512
dc0ab8f3290d2b651f889b98750496dad7b2fbab9f67c31ac27250599ef019b70064eb3b29fd0f8a4b30c105c3cce95677b1ac09692549d722b701c1341f89f2
-
SSDEEP
768:GtHZdFWNgiusI3fSeHBxPlJTCU8bXF6ZUN4UyIZZfZrwH9:aWqiHIvSezPlMh78xIQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 043db667507facb5fecc5e988b83b38f_JaffaCakes118
Files
-
043db667507facb5fecc5e988b83b38f_JaffaCakes118.exe windows:4 windows x86 arch:x86
288ade89447ba4759a6a1afe847c600d
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
ExitProcess
VirtualAlloc
GetFileSize
CreateFileA
ReadFile
GetCommandLineA
SetCurrentDirectoryA
ResumeThread
SetThreadPriority
CreateProcessA
CloseHandle
WriteFile
GetCurrentDirectoryA
OpenMutexA
FindClose
FindFirstFileA
lstrcpyA
lstrcpynA
lstrcatA
GetShortPathNameA
GetFileAttributesA
WritePrivateProfileStringA
GetPrivateProfileStringA
Sleep
DeleteFileA
SetFileAttributesA
FindNextFileA
RemoveDirectoryA
CopyFileA
SetFilePointer
GetWindowsDirectoryA
GetTempPathA
CompareStringA
InterlockedIncrement
GetModuleHandleA
MultiByteToWideChar
SetErrorMode
LoadLibraryExA
GetLastError
GetProcAddress
lstrlenA
FreeLibrary
LoadLibraryA
WaitForSingleObject
GetModuleFileNameA
user32
GetWindowLongA
LoadIconA
SetClassLongA
SendMessageA
EndDialog
DialogBoxParamA
ShowWindow
SetWindowPos
PostMessageA
SetDlgItemTextA
FindWindowA
EnumWindows
GetWindowTextA
wvsprintfA
MessageBoxA
wsprintfA
SetWindowTextA
GetWindowRect
GetDlgItem
EnableWindow
SendDlgItemMessageA
gdi32
RemoveFontResourceA
advapi32
RegCloseKey
RegEnumKeyExA
RegOpenKeyExA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
RegDeleteKeyA
shell32
SHChangeNotify
ole32
OleInitialize
OleUninitialize
oleaut32
LoadTypeLi
UnRegisterTypeLi
Sections
.text Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Shared Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.lea Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE