Static task
static1
Behavioral task
behavioral1
Sample
087aa1156c46730e79e73b5eac0cf7ec_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
087aa1156c46730e79e73b5eac0cf7ec_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
087aa1156c46730e79e73b5eac0cf7ec_JaffaCakes118
-
Size
153KB
-
MD5
087aa1156c46730e79e73b5eac0cf7ec
-
SHA1
6dcc1963631650c6e89334b56cbb9b110dbc61ad
-
SHA256
795ea570bf87f12afe6f140d4d5904cb6ec5f0c219633008967a5d92b331c261
-
SHA512
e7d48009c3b01fcc6870c8d5a4a61f4c02dc32ff1f42f9a98ba80eb3967da995ac021a51ac8569e1645d3d1abd2c9b65bc69307e076c73866abcf68f6c8e3301
-
SSDEEP
3072:AMqsQNxJUJY0E88ZFPbBlGzneLQgaSMfefxO8D56a6+vx7BQEnE:9Q90hkPfGzIQOb6a6t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 087aa1156c46730e79e73b5eac0cf7ec_JaffaCakes118
Files
-
087aa1156c46730e79e73b5eac0cf7ec_JaffaCakes118.exe windows:4 windows x86 arch:x86
e6c3de54979c5c81c6eb3664e3bd055a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerInstallFileA
kernel32
CloseHandle
Sleep
lstrlenW
DeleteFileA
LoadLibraryA
GetProcAddress
SetEvent
OpenEventA
AddAtomA
HeapDestroy
GetModuleHandleA
GetStartupInfoA
HeapCreate
ExitProcess
GetCommandLineA
HeapAlloc
CompareStringA
HeapFree
LockResource
LoadResource
CompareStringW
GetVersionExA
SetErrorMode
LocalFree
FormatMessageA
InterlockedDecrement
CreateProcessA
CreateFileA
CopyFileA
GetTempFileNameA
GetTempPathA
WaitForSingleObject
SetFileAttributesA
ReadFile
GetShortPathNameA
GetPrivateProfileStringA
GetFileAttributesA
CreateDirectoryA
GlobalLock
GlobalAlloc
MultiByteToWideChar
GetModuleFileNameA
RtlUnwind
WideCharToMultiByte
lstrlenA
GlobalUnlock
GlobalFree
GetLastError
SetLastError
lstrcpyA
lstrcatA
GetUserDefaultLangID
GetPrivateProfileIntA
FindResourceA
FindResourceExA
GetWindowsDirectoryA
user32
TranslateMessage
PeekMessageA
GetWindowLongA
EndDialog
GetDlgItem
SendMessageA
SetWindowLongA
DispatchMessageA
IsDialogMessageA
CreateDialogIndirectParamA
SetDlgItemTextA
GetDesktopWindow
GetClientRect
GetWindowRect
MoveWindow
CharNextA
CharUpperA
CharLowerA
ReleaseDC
LoadImageA
GetDC
EndPaint
CreateDialogParamA
BeginPaint
DialogBoxIndirectParamA
MessageBoxA
DestroyWindow
wsprintfA
gdi32
DeleteDC
SelectObject
RealizePalette
SelectPalette
UnrealizeObject
CreateCompatibleDC
GetObjectA
GetDeviceCaps
CreateHalftonePalette
CreatePalette
GetSystemPaletteEntries
GetDIBColorTable
BitBlt
advapi32
RegCreateKeyA
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegOpenKeyA
RegQueryValueExA
ole32
CoCreateInstance
CoFreeAllLibraries
CoInitialize
CoUninitialize
oleaut32
SysAllocStringLen
SysStringLen
SysFreeString
SafeArrayGetLBound
VariantClear
SafeArrayGetElement
SysAllocString
SafeArrayGetUBound
Sections
.text Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ