Static task
static1
Behavioral task
behavioral1
Sample
0b6ca9df9e96a971a06029193ebc8f45_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
0b6ca9df9e96a971a06029193ebc8f45_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
0b6ca9df9e96a971a06029193ebc8f45_JaffaCakes118
-
Size
224KB
-
MD5
0b6ca9df9e96a971a06029193ebc8f45
-
SHA1
e70ff86b10d47618bf55f6a1dd82b8bd4b766e80
-
SHA256
13124c22203532ef544799db92561a9d6c67a8d4bccbb818b61979afb0e809fb
-
SHA512
577e6241ed3f5b436f70ee6a0f40d4d6472444b51a64d477eaa7d1074b50ca86646279887df76848bdd4ca0167288e9d1d1fad68a4f83178a865e0dd8cc9cc14
-
SSDEEP
3072:AjeJ21wouYP8Hu4omdmZ9mrCcYyyaZJsoz+fajQrDJihSGi3H8l5GScF9j:AjewXYHpd9rCIjv+fYQhYSGi38lQFN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0b6ca9df9e96a971a06029193ebc8f45_JaffaCakes118
Files
-
0b6ca9df9e96a971a06029193ebc8f45_JaffaCakes118.exe windows:4 windows x86 arch:x86
a934e1593a648d4722e8c70cc3db93cd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WideCharToMultiByte
SizeofResource
LoadResource
FindResourceA
GetLastError
LoadLibraryExA
lstrcmpiA
lstrcpynA
IsDBCSLeadByte
CreateMutexA
GetCurrentThreadId
GetCommandLineA
InitializeCriticalSection
lstrcpyA
lstrcatA
DeleteCriticalSection
CopyFileA
GetCurrentProcess
FlushFileBuffers
ReadFile
SetStdHandle
GetShortPathNameA
IsBadCodePtr
IsBadReadPtr
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStringTypeW
GetStringTypeA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
HeapSize
TerminateProcess
LCMapStringW
LCMapStringA
GetOEMCP
GetACP
GetCPInfo
ExitProcess
GetVersion
GetStartupInfoA
RaiseException
HeapReAlloc
HeapAlloc
HeapFree
lstrlenA
MultiByteToWideChar
lstrlenW
GetWindowsDirectoryA
GetModuleHandleA
GetModuleFileNameA
GetVersionExA
GetSystemDefaultLCID
GetLocaleInfoA
InterlockedDecrement
LoadLibraryA
GetProcAddress
FreeLibrary
GetSystemDirectoryA
WriteFile
CreateFileA
GetFileTime
FileTimeToLocalFileTime
FileTimeToSystemTime
GetDateFormatA
RtlUnwind
LocalFree
CloseHandle
GetUserDefaultLangID
InterlockedIncrement
SetFilePointer
user32
SendMessageA
DefWindowProcA
CharNextA
PostThreadMessageA
DispatchMessageA
GetMessageA
PostMessageA
CreateWindowExA
RegisterClassA
LoadIconA
SetForegroundWindow
FindWindowA
PostQuitMessage
EnableWindow
GetDlgCtrlID
EndDialog
GetDlgItem
SetWindowTextA
WinHelpA
LoadStringA
GetWindowRect
EnableMenuItem
wsprintfA
EnumDisplaySettingsA
CallWindowProcA
SetWindowLongA
GetParent
DialogBoxParamA
EnumChildWindows
GetSystemMenu
advapi32
RegSetValueExA
RegCloseKey
RegQueryValueExA
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegEnumKeyExA
ole32
CoCreateInstance
CLSIDFromProgID
CoTaskMemFree
CoTaskMemAlloc
CoRevokeClassObject
CoRegisterClassObject
CoInitialize
CoUninitialize
CoSuspendClassObjects
CoTaskMemRealloc
oleaut32
VariantClear
RegisterTypeLi
SysFreeString
SysAllocString
SysAllocStringByteLen
SysStringByteLen
SysStringLen
VarUI4FromStr
LoadTypeLi
comctl32
CreatePropertySheetPageA
DestroyPropertySheetPage
PropertySheetA
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
hccutils
IsDisplayValid
EnumDeviceByClass
GetAttachedMonitorDevice
FindResources
LoadSTRING
GetDisplayDevice
FindDeviceByNameAndClass
ReleaseClassDevice
LoadDialogString
GetCUIDriverFromClassDevice
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 16KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE