Static task
static1
Behavioral task
behavioral1
Sample
0a95aaceef31c9e5e6c4e893000f6165_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0a95aaceef31c9e5e6c4e893000f6165_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0a95aaceef31c9e5e6c4e893000f6165_JaffaCakes118
-
Size
3.8MB
-
MD5
0a95aaceef31c9e5e6c4e893000f6165
-
SHA1
0c9eba509ad9de21ee899cfd5d4e87aa14fb350e
-
SHA256
5a66391bd6e0e4ab3bf69ebb05c68d3f01f9d5d82e9a134a53d104e07aa1831d
-
SHA512
affeaca2656c6050fa66d140a54646672fcb14f1a74aea234f5d622a078d59cb8b418a19d763e5a153a0d7b7a870384b916b8fbbb8a809904ab4f35d790f4ef0
-
SSDEEP
98304:quG42RnADYYdbcloAqgUlVYGuoT9STED6I8sDxHYDWfS:quLQADYw+ErfHuoTITEDZ5xHNS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0a95aaceef31c9e5e6c4e893000f6165_JaffaCakes118
Files
-
0a95aaceef31c9e5e6c4e893000f6165_JaffaCakes118.exe windows:4 windows x86 arch:x86
78a5fe08b38b0189dbf83a02ac6fc991
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
TryEnterCriticalSection
GetCommModemStatus
SetProcessAffinityMask
GetOEMCP
GetFullPathNameA
ClearCommBreak
WritePrivateProfileStringA
CreateProcessA
SetSystemTime
SetErrorMode
GetPrivateProfileSectionW
ScrollConsoleScreenBufferA
FlushFileBuffers
ExitProcess
lstrcmpA
GenerateConsoleCtrlEvent
user32
GetMenuDefaultItem
IsCharUpperW
SendNotifyMessageW
MonitorFromWindow
ExcludeUpdateRgn
WaitForInputIdle
DefWindowProcA
SetActiveWindow
CharNextA
GetWindowRgn
EnumDisplaySettingsExW
ClientToScreen
CreateDialogIndirectParamA
VkKeyScanW
SendMessageA
SetWindowTextA
SetCursorPos
GetClipboardData
SetPropA
ScreenToClient
GetParent
EnableMenuItem
LoadStringA
DestroyCaret
DefDlgProcA
GetNextDlgGroupItem
MsgWaitForMultipleObjects
GetMonitorInfoW
LoadStringW
RegisterHotKey
CharPrevW
GetWindowTextLengthW
SendDlgItemMessageA
GetClassInfoExA
SetCursor
IsRectEmpty
CharUpperW
SetForegroundWindow
GetDlgItem
RegisterDeviceNotificationW
CopyRect
DefFrameProcA
SetCapture
ExitWindowsEx
SetWindowPos
TabbedTextOutA
GetUserObjectInformationA
ToAscii
CreateIconIndirect
SetUserObjectSecurity
TrackPopupMenuEx
ToUnicodeEx
ModifyMenuW
CreateIcon
EnumChildWindows
ChildWindowFromPointEx
HideCaret
GetMessagePos
GetWindowLongW
MenuItemFromPoint
MonitorFromPoint
SetParent
gdi32
Ellipse
CreateDIBSection
RectInRegion
ExtTextOutW
CreatePatternBrush
AddFontResourceA
GetCurrentObject
OffsetClipRgn
StartDocA
GetWindowOrgEx
EnumEnhMetaFile
CreateICW
GetLayout
GetTextExtentPoint32A
FillRgn
CreateICA
EndDoc
SetGraphicsMode
GetBitmapBits
GetSystemPaletteEntries
ExtFloodFill
advapi32
DuplicateToken
CryptGenRandom
CryptReleaseContext
PrivilegeCheck
RegQueryValueExA
IsValidAcl
GetPrivateObjectSecurity
GetSecurityDescriptorOwner
RegQueryValueA
CreateServiceA
GetCurrentHwProfileW
OpenEventLogW
AddAccessAllowedAce
RegSetValueA
RegCloseKey
StartServiceCtrlDispatcherW
GetSecurityDescriptorLength
ReadEventLogW
CryptVerifySignatureW
MakeSelfRelativeSD
RegSaveKeyA
CryptSetKeyParam
GetUserNameA
InitiateSystemShutdownA
StartServiceA
LookupPrivilegeValueW
ImpersonateNamedPipeClient
RegSetValueExA
OpenSCManagerW
shell32
DragAcceptFiles
DragFinish
SHGetSettings
FindExecutableW
oleaut32
VariantCopy
QueryPathOfRegTypeLi
shlwapi
wvnsprintfW
StrFormatByteSizeA
StrCpyNW
Sections
.text Size: 13KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ