Static task
static1
Behavioral task
behavioral1
Sample
0a01c0f1b5c94189478c52c95c6da643_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
0a01c0f1b5c94189478c52c95c6da643_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0a01c0f1b5c94189478c52c95c6da643_JaffaCakes118
-
Size
570KB
-
MD5
0a01c0f1b5c94189478c52c95c6da643
-
SHA1
49db3479011b7b9716f53b8dbf25c253c8ae0c64
-
SHA256
6b7cffd0112d18ffa9fa72e40a69ff99e5e262c309ca49ead73eb73a2c836c0d
-
SHA512
20e2e395638d0532f23e5404618b05ea80083cffc5d39bbb7114e77bdb5fecf1362076ed49980fe245e7bc1f0c046f8662c75939d233f2ba7075c29c548f49c1
-
SSDEEP
12288:Dxw7sFqjPsxK5lbanvHi5qKhRkluL8N6OQhr3V4eUsu+YV0b2z:DxbYBlYvC57klIxOUR4eKJz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a01c0f1b5c94189478c52c95c6da643_JaffaCakes118
Files
-
0a01c0f1b5c94189478c52c95c6da643_JaffaCakes118.exe windows:4 windows x86 arch:x86
3b2044e69e7db17ec94505c77d8a0c03
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
ScaleWindowExtEx
SetWindowOrgEx
EnumObjects
PolyPolyline
oleaut32
SafeArrayGetLBound
ole32
CoResumeClassObjects
OleSetMenuDescriptor
CoFileTimeNow
PropVariantCopy
user32
GetMenuItemInfoA
DialogBoxParamW
DrawIcon
GetUserObjectSecurity
ChangeMenuW
RemoveMenu
DestroyIcon
SetMenuItemInfoW
InvalidateRect
ChangeMenuA
advapi32
CryptGetKeyParam
RegRestoreKeyA
SetPrivateObjectSecurity
RegEnumValueW
NotifyBootConfigStatus
ChangeServiceConfigW
RegisterEventSourceA
RegQueryValueExA
SetFileSecurityW
StartServiceCtrlDispatcherW
CloseEventLog
GetCurrentHwProfileW
CreatePrivateObjectSecurity
RegQueryInfoKeyA
ObjectCloseAuditAlarmW
GetSecurityDescriptorDacl
MakeAbsoluteSD
NotifyChangeEventLog
kernel32
ReadFileScatter
FindCloseChangeNotification
LocalAlloc
lstrcmpA
Beep
CreateEventA
PrepareTape
GetTickCount
OpenMutexA
UnhandledExceptionFilter
GetFileType
EnumCalendarInfoA
GetAtomNameA
SetProcessWorkingSetSize
SetEvent
GlobalDeleteAtom
CreateDirectoryW
ExitProcess
FillConsoleOutputCharacterA
VirtualUnlock
FlushFileBuffers
GlobalUnlock
GetThreadContext
FindFirstFileW
GetLogicalDriveStringsA
SetEndOfFile
CreateDirectoryA
VirtualFree
ReadConsoleInputW
FatalAppExitA
EraseTape
_lread
GlobalGetAtomNameW
EnumSystemCodePagesW
GetFileAttributesExA
SizeofResource
GlobalFree
SetTimeZoneInformation
ClearCommBreak
DebugBreak
CompareStringW
LocalSize
QueryDosDeviceA
SetErrorMode
FormatMessageA
InitializeCriticalSection
_lclose
GlobalReAlloc
GetCommModemStatus
GlobalFlags
OpenSemaphoreW
SetConsoleCursorPosition
_lopen
EnumTimeFormatsW
LocalFileTimeToFileTime
GetProfileIntA
EnumDateFormatsW
ws2_32
getservbyname
WSASocketW
WSALookupServiceNextW
sendto
msvcrt
wcsftime
_isctype
puts
localeconv
_mbsnbcpy
_execlp
_chdrive
setlocale
_ismbblead
wcsncat
strrchr
Sections
.text Size: 3KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 267KB - Virtual size: 267KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ