Static task
static1
Behavioral task
behavioral1
Sample
053c5d5012aba237b1538df57a4b6e9c_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
053c5d5012aba237b1538df57a4b6e9c_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
053c5d5012aba237b1538df57a4b6e9c_JaffaCakes118
-
Size
48KB
-
MD5
053c5d5012aba237b1538df57a4b6e9c
-
SHA1
e4131cf8386fd9af2cabb08a9455f0a4097e8871
-
SHA256
a0b0ead2bc00776b03b3263d3699b03fd87ea22c0e46c9433e890933b3da72d2
-
SHA512
0bbc64181498f489b80215b39365f56a7ccbb59eef0ce088e4d1846cc50a5e735b6986459d7a5db2fc6fb05bfa5901be8677b6674f726c0b4bb7504b64ff0ff6
-
SSDEEP
1536:QN+cvbauqdfdkeeY6g3vAz7la4U4Esgr5P7:QN+UFG6AAzc4aTd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 053c5d5012aba237b1538df57a4b6e9c_JaffaCakes118
Files
-
053c5d5012aba237b1538df57a4b6e9c_JaffaCakes118.exe windows:4 windows x86 arch:x86
4136c33ca249fc2a010344a60a776878
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
ntdll
NtAddAtom
user32
DestroyWindow
DispatchMessageA
PeekMessageA
LoadStringA
InvalidateRect
GetWindowLongA
ShowWindow
CharPrevA
IsWindow
DrawTextA
EnableWindow
wsprintfA
CharUpperA
LoadBitmapA
SetWindowLongA
SendDlgItemMessageA
SendMessageA
CreateDialogParamA
IsDialogMessageA
LoadImageA
GetDlgItem
GetWindowTextA
ReleaseDC
MessageBoxA
DialogBoxParamA
GetSysColor
SetWindowTextA
TranslateMessage
GetWindowRect
MsgWaitForMultipleObjects
SetWindowPos
IsDlgButtonChecked
GetClientRect
GetDC
SetDlgItemTextA
CheckDlgButton
EndDialog
DestroyIcon
gdi32
CreateCompatibleDC
SaveDC
SetTextColor
SetWindowOrgEx
GetObjectA
ModifyWorldTransform
GetDeviceCaps
GetTextMetricsA
CreateSolidBrush
DeleteDC
SetBkColor
DPtoLP
CreateFontIndirectA
DeleteObject
RestoreDC
SetGraphicsMode
ExtTextOutA
SelectObject
SetViewportOrgEx
BitBlt
advpack
RegInstall
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
advapi32
RegEnumKeyExA
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegEnumValueA
RegDeleteKeyA
atl
AtlMarshalPtrInProc
kernel32
CloseHandle
VirtualAlloc
GetDiskFreeSpaceA
lstrcmpiA
GetProcessHeap
lstrcpynA
InitializeCriticalSection
HeapAlloc
LocalAlloc
DisableThreadLibraryCalls
GetSystemDirectoryA
GetModuleHandleA
CreateFileA
FreeLibrary
HeapReAlloc
CreateEventA
HeapFree
lstrcatA
GetProcAddress
LocalFree
GetTickCount
CreateThread
lstrcmpA
InterlockedDecrement
GetModuleFileNameA
DeleteCriticalSection
HeapSize
InterlockedIncrement
SetEvent
LoadLibraryA
GetWindowsDirectoryA
lstrlenA
Sections
.textbss Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 448B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ