Static task
static1
Behavioral task
behavioral1
Sample
0fa1417dd53286efc5d222e686ab4be4_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0fa1417dd53286efc5d222e686ab4be4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0fa1417dd53286efc5d222e686ab4be4_JaffaCakes118
-
Size
386KB
-
MD5
0fa1417dd53286efc5d222e686ab4be4
-
SHA1
f2d43eeea5c96401bda868cb88939a04a723de86
-
SHA256
cd82f88859462a4bd17434a46b5971cf8bcdf8e198f2777f40a5d88cee8251dc
-
SHA512
db9423106a1638510cfbf6514dae99d35c82a48855b50e0da8751a637d6a2b7ff343d939cfb7e62a35dbc7d2c21408c1eafd3ec1bc53d13081506a31ae3744a7
-
SSDEEP
12288:gTzs2q9yjZZnXM5k9k0UB7WPqXl3Ka6at6FPVJ:gTzs2q9inXM+9khB7WPqXl3/ktVJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0fa1417dd53286efc5d222e686ab4be4_JaffaCakes118
Files
-
0fa1417dd53286efc5d222e686ab4be4_JaffaCakes118.exe windows:4 windows x86 arch:x86
7b4283767db3dbbfe22ec375f0d545e8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
GetModuleHandleA
FreeResource
SizeofResource
LockResource
LoadResource
FindResourceExA
VirtualProtect
HeapAlloc
GetSystemInfo
HeapCreate
InterlockedDecrement
DeleteFileA
ReadFile
CreateFileA
lstrlenA
GlobalFree
WriteFile
GlobalAlloc
LoadLibraryA
SystemTimeToFileTime
GetSystemTime
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetStartupInfoA
DebugBreak
HeapReAlloc
HeapFree
lstrcpyA
PulseEvent
GetLastError
VirtualAlloc
GetModuleFileNameA
VirtualQuery
LoadLibraryW
SetEvent
GetProcAddress
FreeLibrary
ExitProcess
GetCommandLineA
GetCurrentThreadId
lstrcmpiA
Sleep
CreateEventA
CreateThread
WaitForSingleObject
CloseHandle
LocalAlloc
user32
LoadIconA
UpdateWindow
ShowWindow
CreateWindowExA
PostQuitMessage
EndPaint
DrawTextA
BeginPaint
DestroyWindow
DialogBoxParamA
EndDialog
LoadCursorA
IsWindowVisible
LoadStringA
UnregisterClassA
PeekMessageA
TranslateMessage
PostMessageA
GetDC
FillRect
ReleaseDC
GetClientRect
RegisterClassA
BringWindowToTop
RegisterClassExA
AttachThreadInput
EnumDisplaySettingsA
DrawIcon
GetMessageA
LoadAcceleratorsA
TranslateAcceleratorA
SystemParametersInfoA
GetDesktopWindow
DispatchMessageA
CharNextA
PostThreadMessageA
DefWindowProcA
gdi32
SetTextAlign
MoveToEx
GetDeviceCaps
TextOutA
Rectangle
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
GetDIBits
SetROP2
GetObjectA
shell32
ExtractIconA
ole32
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
VariantClear
VariantInit
atl
ord57
ord21
ord16
ord23
ord17
ord20
ord18
wininet
InternetOpenW
InternetCloseHandle
Sections
.text Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 333KB - Virtual size: 717KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imuls Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.erd Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ