Static task
static1
Behavioral task
behavioral1
Sample
0a6dc25560726472c8822559503cb828_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0a6dc25560726472c8822559503cb828_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0a6dc25560726472c8822559503cb828_JaffaCakes118
-
Size
209KB
-
MD5
0a6dc25560726472c8822559503cb828
-
SHA1
085497801e85f73779d280804ece006e7b1e1caf
-
SHA256
c9f37df04217a31cf0bc0af31156ba661ee58d5fea8ebeac0adf78da57d5c8f4
-
SHA512
a843a6db1899ef44d4a7ebc718ad36c9e1ae148dd1ce527021166a0eeca214edbb134e00a7fdbfced9d078c8ffd4837f4ed8ea52cef7ed231ec81a0d882ab789
-
SSDEEP
3072:AIfLOGdQyTP591doS12Na+SbLkyREmEgqdUZ+FkdrwcOyuF5mq/zN96Ss:3TP53doIfFKHndPkJw5ye5PN9Ds
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a6dc25560726472c8822559503cb828_JaffaCakes118
Files
-
0a6dc25560726472c8822559503cb828_JaffaCakes118.exe windows:4 windows x86 arch:x86
8a5b84d324b43508d0aa218d013fd6b5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
rpcrt4
NdrClientCall
RpcStringBindingComposeA
RpcBindingFromStringBindingA
RpcBindingSetAuthInfoA
RpcStringFreeA
comdlg32
GetFileTitleA
comctl32
ImageList_GetIconSize
ImageList_Create
ImageList_Add
ImageList_DrawEx
ImageList_Destroy
shlwapi
PathCanonicalizeW
PathIsRelativeW
PathIsRootW
PathStripToRootW
PathIsURLW
PathCombineW
kernel32
FindResourceExA
GetProfileStringW
IsDBCSLeadByte
CreateFiber
GetVersionExW
SearchPathW
WriteFileGather
GetFileTime
FlushFileBuffers
UnlockFile
CompareStringW
EnumResourceNamesW
GetFileType
SetEndOfFile
LocalAlloc
VerLanguageNameW
FlushFileBuffers
LockFile
GetFileAttributesA
FileTimeToSystemTime
GetSystemTime
GetUserDefaultLangID
GetVolumeInformationW
FileTimeToLocalFileTime
GetSystemDirectoryW
ole32
CLSIDFromString
OleGetAutoConvert
CoTaskMemFree
StgOpenStorageOnILockBytes
CoTaskMemAlloc
ProgIDFromCLSID
CLSIDFromProgID
OleDuplicateData
CoGetClassObject
CoFreeUnusedLibraries
CoCreateGuid
CreateStreamOnHGlobal
CoGetMalloc
RevokeDragDrop
ReleaseStgMedium
OleRun
RegisterDragDrop
GetHGlobalFromILockBytes
StringFromCLSID
StgCreateDocfileOnILockBytes
OleRegGetUserType
GetHGlobalFromStream
CoCreateInstance
CreateILockBytesOnHGlobal
user32
CallNextHookEx
DestroyCursor
DrawEdge
GetSysColorBrush
IsClipboardFormatAvailable
DestroyIcon
MonitorFromWindow
WinHelpW
DefWindowProcW
UnhookWindowsHookEx
SetWindowsHookExW
ClipCursor
ToAscii
SetClipboardData
SetScrollRange
EmptyClipboard
RegisterClassW
ChildWindowFromPoint
SetWindowPos
GetSysColor
Sections
.text Size: 190KB - Virtual size: 190KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lib Size: 512B - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ